Network Asset Detection Based on Weakly Supervised Learning

Authors

  • Guowei Zhang
  • Jie Zhao
  • Pengyuan Ma
  • Junjie Wu

DOI:

https://doi.org/10.62051/ijcsit.v5n1.13

Keywords:

Weakly supervised learning, Network assets, Device fingerprint

Abstract

Network asset detection technology is the basis for sorting out and counting Internet assets, timely managing vulnerable network assets and anomaly detection. Due to various shortcomings in existing methods for obtaining device fingerprint information, the accuracy of evaluation results for network asset devices is low and the functionality is single. For this reason, proposes a network asset detection method based on weakly supervised learning, which aims to simulate the real network data in the network environment as much as possible to detect network assets, achieve more accurate results, so as to connect with the task of sorting out Internet assets and timely warning network asset vulnerabilities. The results indicate that there is a significant improvement in the speed and accuracy of asset detection when using only 30% of labeled data.

Downloads

Download data is not yet available.

References

[1] Long Zhu. Research on Cyberspace Asset Detection and Analysis Technology [J]. Wireless Internet Technology, 2023, 20 (03): 149-151.

[2] Xianzhe Yang. Research on security early warning based on fingerprint detection method of network assets [D]. Zhengzhou University of Light Industry, 2022. DOI: 10.27469/d.cnki.gzzqc.2022.000015.

[3] Mingxing Li. Research and Implementation of Network Asset Detection Technology Based on Deep Learning [D]. Beijing University of Posts and Telecommunications, 2023. DOI: 10.26969/d.cnki.gbydu.2023.001486.

[4] Yongxia Wang, Yuxuan Jiang, Xiangzhe Yuan. Research and Analysis of Intranet Asset Detection Technology [J]. Network Security Technology and Application, 2024, (05):18-20.

[5] Chendong Wang, Yuanbo Guo, Shuaihui Zhen, etc. Research on Network Asset Detection Technology [J]. Computer Science, 2018, 45 (12): 24-31.

[6] Lei Shao, Xiao Yu, Jianzhang Wu. Research on Key Technologies of Network Asset Detection [J]. Network Security and Data Governance, 2022, 41 (11): 3-9+35. DOI: 10.19358/j.issn.2097-1788.2022.05.001.

[7] Yu Shen. Research and application of automatic identification method of network assets [D]. Shanxi University, 2021. DOI: 10.27284/d.cnki.gsxiu.2021.001759.

[8] Lijun Cheng, Zhiyong Zhang, Yuguang Zhang, etc. Research on Cyberspace Asset Detection and Analysis Technology [J]. Security Science and Technology, 2021, (03):13-19.

[9] Ziqiang Li, Wei Yang, Xianfeng Yang, etc. Semi automatic classification data annotation method based on weak label dispute [J]. Journal of Electronics, 2024, 52 (08): 2891-2899.

[10] Haowei Cheng, Wenjie Zi, Shuang Peng, etc. A 3D Mesh building facade extraction and semantic segmentation method based on semi supervised learning [J]. Journal of Zhengzhou University (Science Edition), 2023, 55 (04): 8-15. DOI: 10.13705/j.issn.1671-6841.2022161.

[11] Zhi-Hua Zhou, A brief introduction to weakly supervised learning, National Science Review, Volume 5, Issue 1, January 2018, Pages 44–53, https://doi.org/10.1093/nsr/nwx106

[12] Yu Zhong, Zhennan Huang, Huichao Xie, etc. A network abnormal traffic detection method based on semi supervised learning [J]. Journal of Guangxi University (Natural Science Edition), 2024, 49 (03): 563-574. DOI: 10.13624/j.cnki.issn.1001-7445.2024.0563.

[13] Tianhao Wang. Research on general ellipse target detection method based on deep learning [D]. Southeast University, 2023. DOI: 10.27014/d.cnki.gdnau.2023.000352.

[14] Xianzhe Yang, Yifeng Yin, Hongtao Zhang, etc. Research on Network Asset Detection and Early Warning of Education System [J]. Computer Applications and Software, 2023, 40 (10): 322-328.

[15] Lee D H. Pseudo-Label: The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks [J]. 2013.

[16] Kostas K, Just M, Lones M A. IoTDevID: A Behavior-Based Device Identification Method for the IoT [J]. IEEE internet of things journal, 2022, 9(23):23741-23749.

[17] Wang X, Gao J, Wang J, et al. Self-Tuning for Data-Efficient Deep Learning [J]. 2021. DOI:10.48550/arXiv.2102.12903.

[18] Mingliang Yao, Ning Lu, Zhuanyan Bai, etc. Construction method of device fingerprint search engine for network asset vulnerability assessment [J]. Journal of Electronics, 2019, 47 (11): 2354-2358.

Downloads

Published

23-01-2025

Issue

Section

Articles

How to Cite

Zhang, G., Zhao, J., Ma, P., & Wu, J. (2025). Network Asset Detection Based on Weakly Supervised Learning. International Journal of Computer Science and Information Technology, 5(1), 139-147. https://doi.org/10.62051/ijcsit.v5n1.13