Automatic search of the malicious messages in the internet of things systems on the example of an intelligent detection of the unnatural agents requests
{"title":"Automatic search of the malicious messages in the internet of things systems on the example of an intelligent detection of the unnatural agents requests","authors":"A. Iskhakova, R. Meshcheryakov","doi":"10.1109/RPC.2017.8168074","DOIUrl":null,"url":null,"abstract":"The article considers one of the actual threats of the Internet of things related to the transmission of malicious or incorrect electronic messages between agents. Methods of the transmitted data automatic verification and filtering by some set of features in Internet systems of things are analyzed. Authors propose an approach to the intelligent detection of unnatural requests between agents, which could minimize the likelihood of the implementation of threats.","PeriodicalId":144625,"journal":{"name":"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RPC.2017.8168074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The article considers one of the actual threats of the Internet of things related to the transmission of malicious or incorrect electronic messages between agents. Methods of the transmitted data automatic verification and filtering by some set of features in Internet systems of things are analyzed. Authors propose an approach to the intelligent detection of unnatural requests between agents, which could minimize the likelihood of the implementation of threats.