IOT invasion monitoring method and device

A technology of intrusion monitoring and Internet of Things, applied in the field of Internet of Things security

Active Publication Date: 2017-04-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the embodiments of the present invention is to provide a method and device for intrusion monitoring of the Internet of Things, so as to solve the problem of monitoring intrusion behaviors in the perception layer of the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IOT invasion monitoring method and device
  • IOT invasion monitoring method and device
  • IOT invasion monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0021] see figure 2 , the embodiment of the present invention provides a method for intrusion monitoring of the Internet of Things, the method comprising:

[0022] Step S200: Acquiring data collected by sensing devices at nodes of the sensing layer of the Internet of Things;

[0023] Step S210: Based on the obtained data as training data and using the TrAdaBoost method, an Internet of Things intrusion classification model is established, wherein the Internet of Things intrusion classification includes an intrusion behavior set and a normal behavior set;

[0024] Step S220: Obtain the test data collected by the sensing device at the sensing layer node of the Internet of Things again, and use the Internet of Things intrusion classification model to perform classification judgment;

[0025] Step S230: If the test data is divided into intrusion behavior sets, interception and alarm processing are performed;

[0026] Step S240: If the test data is classified into a normal behavi...

no. 2 example

[0029] see image 3 , the embodiment of the present invention provides a method for intrusion monitoring of the Internet of Things, the method comprising:

[0030] Step S300: Acquiring data collected by sensing devices at the sensing layer nodes of the Internet of Things;

[0031] The hierarchical structure of the Internet of Things is divided into three layers, from bottom to top: the perception layer, the network layer, and the application layer. The perception layer is the core of the Internet of Things and a key part of information collection. The perception layer is located at the bottom of the three-layer structure of the Internet of Things, and its function is "perception", that is, to obtain environmental information through the sensor network. The perception layer is the core of the Internet of Things and a key part of information collection.

[0032]The perception layer includes two-dimensional code tags and readers, RFID tags and readers, cameras, GPS, sensors, M...

no. 3 example

[0075] Please refer to Figure 4 , the embodiment of the present invention provides an Internet of Things intrusion monitoring device 400, the device 400 includes:

[0076]The first data acquisition unit 410 is configured to acquire data collected by sensing devices at the sensing layer nodes of the Internet of Things.

[0077] The Internet of Things intrusion classification model establishment unit 420 is configured to establish an Internet of Things intrusion classification model based on the obtained data as training data and using the TrAdaBoost method, wherein the Internet of Things intrusion classification includes an intrusion behavior set and a normal behavior set.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an IOT (Internet of things) invasion monitoring method and device, relating to the field of IOT safety. The method comprises a step of obtaining the data collected by an IOT sensing layer node by using sensing equipment, a step of establishing an IOT invasion classification model by using a TrAdaBoost method based on the obtained data as training data, wherein the IOT invasion classification comprises an invasion behavior set and a normal behavior set, a step of obtaining the test data collected by the IOT sensing layer node by using sensing equipment again, and carrying out classification judgment by using the IOT invasion classification model, and a step of carrying out interception and alarm processing if the test data is divided into the invasion behavior set. The problem of monitoring the invasion behavior of the IOT sensing layer is solved.

Description

technical field [0001] The present invention relates to the security field of the Internet of Things, in particular to a method and device for intrusion monitoring of the Internet of Things. Background technique [0002] As an important part of the communication network in the new information age, the Internet of Things communication technology can not only connect machines with machines to realize new transmission and sharing of physical world perception, but also connect machines with people to achieve a wider and more In-depth information interaction has become a new type of bridge connecting human subjective information service needs and various perception services in the objective world. The security of the perception layer of the Internet of Things is the premise and guarantee for the real practical application of the Internet of Things. The security threats faced by the sensing layer of the Internet of Things mainly include physical attacks, the danger of sensor equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L63/145G06F18/2148G06F18/2431
Inventor 郭燕慧孙博文李祺
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products