Due to the weak network security protection capabilities of control system network protocols under Industry 4.0, the research on industrial control network intrusion detection is still in its infancy. This article discussed and researched the intrusion prevention technology of industrial control networks based on deep learning. According to the electromagnetic scattering theory, the backscatter signal model of the chipless tag was established as a chipless tag structure. Polarized deep learning coding was used for the label; that was, deep learning coding was performed on the copolarization component and the cross‐polarization component at the same time, and a 16‐bit deep learning coding bit number was obtained. The wave crest deep learning coding was used for the split ellipse ring patch label, and the 6‐bit deep learning coding bit number was obtained. Then, the poles of the scattered signal of the tag were extracted to identify the tag. The variable polarization effect was achieved by adopting the dipole resonant unit with the two ends bent. Aiming at the problem of low detection rate caused by the shallow selection of feature classification of intrusion prevention systems, an industrial control network intrusion prevention model based on self‐deep learning encoders and extreme learning machines was proposed to extract features from industrial control network data through deep learning. For accurate classification, the theoretical judgment was also verified through simulation experiments, and it was proved that the detection rate of the model has also improved. It forms a set of industrial control network intrusion prevention system with complete functions and superior performance with data acquisition module, system log module, defense response module, central control module, etc. The matrix beam algorithm was used to extract the poles and residues for the late response, and the extracted poles and residues were used to reconstruct the signal. The reconstructed signal was compared with the scattered signal to verify the correctness of the pole extraction. Finally, the tags were processed and tested in the actual environment, and the measured results were consistent with the theoretical analysis and simulation results.
Read full abstract