Internet-of-things tampering invasion detection method in combination with abnormal monitoring

An intrusion detection and anomaly monitoring technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as tampering with perceived data and destroying data credibility.

Inactive Publication Date: 2015-05-06
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The invention provides a tampering and intrusion detection method of the Internet of Things combined with abnormal monitoring, aiming at the periodic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things tampering invasion detection method in combination with abnormal monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The invention includes local anomaly monitoring, neighbor intrusion detection and global intrusion detection, and the three are combined to realize alarming and positioning of abnormal events, as well as tampering intrusion detection.

[0036]In order to achieve the above purpose, the present invention proposes a three-dimensional, time-space and data-based intrusion detection method for the Internet of Things. Nodes in the network are both sensing nodes and detection nodes. The intrusion detection module is deployed on consoles and nodes, and both include two functions: passive intrusion detection and active intrusion detection. Consider the scenario of periodic environmental monitoring of the Internet of Things. Nodes monitor the environment in a certain period and send monitoring data to the only base station Sink in the network. The disclosure of monitoring data does not need to protect privacy. There are malicious nodes in the network. This patent focuses on the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an internet-of-things tampering invasion detection method in combination with abnormal monitoring. Aiming at a periodic environment monitoring network, the technical problem that the real perception data is tampered by malicious node and the credibility of the data is damaged is solved. The method comprises a local abnormal monitoring step, a neighbor invasion detection step and a global invasion detection step. The space-time relativity of the data in the network is considered, and mutual supervision is performed by using the openness of a channel usable for a node and a neighbor node, so invasion detection between neighbors is realized, and the space relativity is detected by using the global invasion detection with a suspicious abnormal event node as the center; by using the result, on one hand, the monitoring and the positioning of the abnormal event are realized, and on the other hand, the invasion node close to the abnormal event can be reversely detected.

Description

technical field [0001] The invention relates to an Internet of Things tampering and intrusion detection method combined with anomaly monitoring, belonging to the technical field of Internet of Things intrusion detection. Background technique [0002] As the research and application of the Internet of Things has attracted more and more attention, the security issues of the Internet of Things have become increasingly prominent. Since the application of the Internet of Things will involve various fields such as military, people's livelihood, industry and commerce, the importance of its network security is self-evident. The intrusion against the Internet of Things mainly refers to any action that attempts to destroy the integrity, confidentiality, and accessibility of target resources, which is the main aspect of the Internet of Things security research. [0003] Traditional security defense mechanisms, such as encryption and identity authentication, are relatively passive. An...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/1408
Inventor 郑康锋张冬梅高大永武斌伍淳华查选周杨
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products