Terminal abnormity detection method

A technology of anomaly detection and detection method, which is applied in the direction of digital transmission system, data exchange network, closed-circuit television system, etc.

Active Publication Date: 2017-05-31
SHANGHAI CHENRUI INFORMATION TECH
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem of being unable to detect and avoid illegal terminals accessing the privat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal abnormity detection method
  • Terminal abnormity detection method
  • Terminal abnormity detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the following technical solutions and technical features can be combined with each other.

[0035] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0036] Such as Figure 2-3 As shown, a terminal anomaly detection method is suitable for network access detection of a private video network, where at least one video surveillance device is connected to the private video network; each video surveillance device has a unique device fingerprint, and the device fingerprint is the same as that of the video surveillance device The set of feature items corresponding to the operating system;

[0037] Collect the device fingerprint of at least one video surveillance device before the detection method and establish a fingerprint sample library, preset at least one decision rule, define the fluctuation range of each decision rule according to the fingerprint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal abnormity detection method, and belongs to the technical field of private network access device monitoring management. At least one video monitoring device is connected to a video private network; each video monitoring device has a unique device fingerprint, and the device fingerprint is a feature item set corresponding to an operating system of the video monitoring device; before the detecting method, a fingerprint sample library is established, at least one decision rule is preset, the fluctuation range of each decision rule is defined, and a detection model is obtained according to the decision rules via a decision tree algorithm; the method comprises the steps of: acquiring the device fingerprint of the video monitoring device newly connected to the video private network; detecting whether the video monitoring device newly connected to the video private network runs normally according to the detection model, and outputting a detection result and an alarm prompt when the video monitoring device newly connected to the video private network runs abnormally. The method has the advantages of ensuring a trusted terminal is securely and efficiently connected to the video private network, and timely detecting the abnormal device.

Description

technical field [0001] The invention relates to the technical field of monitoring and management of private network access equipment, in particular to a terminal abnormality detection method. Background technique [0002] With the development of video surveillance technology, video private network plays an increasingly important role in the actual business of various industries. However, a large number of video surveillance devices in the private video network are deployed in public areas, and their security and reliability cannot be well guaranteed. Once an intrusion event occurs, the security of video private network resources will not be guaranteed, and this may lead to serious problems such as leakage of citizens' privacy. In recent years, security incidents in the public domain have occurred frequently, and videos involving citizens' privacy have been exposed on the Internet; more serious, for example, in February 2015, a department in a certain place issued a notice s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26H04L12/24H04N7/18
CPCH04L41/0213H04L41/145H04L43/103H04L63/0861H04L63/1425H04N7/183
Inventor 尹心明胡正梁陈国梁黄海晔
Owner SHANGHAI CHENRUI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products