AI and Machine Learning for Industrial Security With Level Discovery Method

Protecting enterprise information security is a main task of Internet of Things system. The interaction between employees in same enterprise is based on level structures. So it is important to discover levels of employees for urban developers to protect enterprise information security. In this article, we propose a level discovery method for employees (LDME) from the records of employees using mobile phones named LDME. The call behavior between employees are expressed as several weighted directed complex networks, LDME represent edges in these weighted directed complex networks as vectors to exact both direction and weight information of the edges. Combined with supervised learning method, LDME prune these weighted directed networks into directed acyclic networks, which accurately reflect levels information between employees. At the same time, LDME mines the maximal frequent directed acyclic substructure from the above directed acyclic networks with efficient way, which indicate the stable levels information. We use real data to verify the performance of our method. The experimental result shows that the level of employees mined with our method is accurate and stable.

[1]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[2]  Jiang Xiao,et al.  LDV: A Lightweight DAG-Based Blockchain for Vehicular Social Networks , 2020, IEEE Transactions on Vehicular Technology.

[3]  Xin Wang,et al.  Association Rules with Graph Patterns , 2015, Proc. VLDB Endow..

[4]  Jong Hyuk Park,et al.  Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks , 2017, Future Gener. Comput. Syst..

[5]  Xingshe Zhou,et al.  Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings , 2012, IEEE Transactions on Knowledge and Data Engineering.

[6]  Meikang Qiu,et al.  Three-phase time-aware energy minimization with DVFS and unrolling for Chip Multiprocessors , 2012, J. Syst. Archit..

[7]  Pingzhi Fan,et al.  Modeling and Performance Analysis of a Tracking-Area-List-Based Location Management Scheme in LTE Networks , 2016, IEEE Transactions on Vehicular Technology.

[8]  Shen Su,et al.  Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..

[9]  Kamalakar Karlapalem,et al.  MARGIN: Maximal Frequent Subgraph Mining , 2006, ICDM.

[10]  Alexandre Termier,et al.  DIGDAG, a First Algorithm to Mine Closed Frequent Embedded Sub-DAGs , 2007, MLG.

[11]  Yang Xu,et al.  Extending association rules with graph patterns , 2020, Expert Syst. Appl..

[12]  Yujie Li,et al.  User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications , 2021, IEEE Transactions on Intelligent Transportation Systems.

[13]  Zhiyong Chen,et al.  Effect of Adding Edges to Consensus Networks With Directed Acyclic Graphs , 2017, IEEE Transactions on Automatic Control.

[14]  Huimin Lu,et al.  The Cognitive Internet of Vehicles for Autonomous Driving , 2019, IEEE Network.

[15]  Joel J. P. C. Rodrigues,et al.  Energy-Efficient Monitoring of Fire Scenes for Intelligent Networks , 2020, IEEE Network.

[16]  Meikang Qiu,et al.  Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software , 2006, IEEE Transactions on Computers.

[17]  Yujie Li,et al.  Deep Fuzzy Hashing Network for Efficient Image Retrieval , 2021, IEEE Transactions on Fuzzy Systems.

[18]  Srinivasan Ramasubramanian,et al.  Independent Directed Acyclic Graphs for Resilient Multipath Routing , 2012, IEEE/ACM Transactions on Networking.

[19]  Huimin Lu,et al.  Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning , 2018, IEEE Internet of Things Journal.

[20]  Jiawei Han,et al.  gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[21]  Khan Muhammad,et al.  DeepReS: A Deep Learning-Based Video Summarization Strategy for Resource-Constrained Industrial Surveillance Scenarios , 2020, IEEE Transactions on Industrial Informatics.

[22]  M. Newman Clustering and preferential attachment in growing networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[23]  Xing Xie,et al.  Design a batched information retrieval system based on a concept-lattice-like structure , 2018, Knowl. Based Syst..

[24]  Flávia Bernardini,et al.  Mining direct acyclic graphs to find frequent substructures - An experimental analysis on educational data , 2019, Inf. Sci..

[25]  Longbing Cao,et al.  A new framework for mining frequent interaction patterns from meeting databases , 2015, Eng. Appl. Artif. Intell..

[26]  Masoud Asadpour,et al.  Community Aware Random Walk for Network Embedding , 2017, Knowl. Based Syst..

[27]  Albert Y. Zomaya,et al.  Prune and Plant: Efficient Placement and Parallelism of Virtual Network Functions , 2020, IEEE Transactions on Computers.

[28]  Wang Peng,et al.  Numerical and experimental study on the maneuverability of an active propeller control based wave glider , 2020 .

[29]  Zhi Chen,et al.  Data Allocation for Hybrid Memory With Genetic Algorithm , 2015, IEEE Transactions on Emerging Topics in Computing.

[30]  Daniel Gatica-Perez,et al.  Human interaction discovery in smartphone proximity networks , 2013, Personal and Ubiquitous Computing.

[31]  Lizhong Xu,et al.  Construction of a Hierarchical Feature Enhancement Network and Its Application in Fault Recognition , 2021, IEEE Transactions on Industrial Informatics.

[32]  Xiaohui Tao,et al.  On relational learning and discovery in social networks: a survey , 2019, Int. J. Mach. Learn. Cybern..

[33]  Irfan Mehmood,et al.  Edge Intelligence-Assisted Smoke Detection in Foggy Surveillance Environments , 2020, IEEE Transactions on Industrial Informatics.

[34]  Linyuan Lü,et al.  Predicting missing links via local information , 2009, 0901.0553.

[35]  A. Barabasi,et al.  Hierarchical Organization of Modularity in Metabolic Networks , 2002, Science.

[36]  Jiong Yang,et al.  SPIN: mining maximal frequent subgraphs from graph databases , 2004, KDD.

[37]  Daniel Schall,et al.  A multi-criteria ranking framework for partner selection in scientific collaboration environments , 2014, Decis. Support Syst..

[38]  Khan Muhammad,et al.  Cost-Effective Video Summarization Using Deep CNN With Hierarchical Weighted Fusion for IoT Surveillance Networks , 2020, IEEE Internet of Things Journal.

[39]  Huimin Lu,et al.  Brain Intelligence: Go beyond Artificial Intelligence , 2017, Mobile Networks and Applications.

[40]  Jibo Wei,et al.  Scheduling directed acyclic graphs with optimal duplication strategy on homogeneous multiprocessor systems , 2020, J. Parallel Distributed Comput..

[41]  Huimin Lu,et al.  Underwater image dehazing using joint trilateral filter , 2014, Comput. Electr. Eng..

[42]  John F. Roddick,et al.  Journal of Graph Algorithms and Applications Fp-graphminer – a Fast Frequent Pattern Mining Algorithm for Network Graphs , 2022 .

[43]  M. Newman,et al.  Vertex similarity in networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.