Internet of things intrusion detection method based on finite state automaton and detection system

A finite automaton and intrusion detection technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of low performance of IoT terminal equipment, inability to use complex cryptographic algorithms, and insufficient single-point computing power.

Active Publication Date: 2017-09-05
XIDIAN UNIV
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problems in the prior art that the performance of the IoT terminal equipment is low and the single-point computing capability cannot be used due to the inability to use complex cryptographic algorithms and complex authentication protocols, the pre...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things intrusion detection method based on finite state automaton and detection system
  • Internet of things intrusion detection method based on finite state automaton and detection system
  • Internet of things intrusion detection method based on finite state automaton and detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to further illustrate the technical means and effects adopted by the present invention to achieve the intended purpose, the specific implementation, structural features and effects of the present invention will be described in detail below in conjunction with the accompanying drawings and examples.

[0069] In the Internet of Things, a large number of sensors, RFID tag devices, CCTV network cameras and other sensing devices with simple computing and storage capabilities will be used, which will greatly expand the network boundaries of the current Internet and provide information collection and information for future networks. function of the service. However, these sensing devices may work in an unsafe environment, and due to the limitation of their computing power, they cannot use complex cryptography mechanisms to protect themselves, and are easily interfered, captured, deciphered, or even tampered with and embedded in malicious attack programs by opponents, r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of things intrusion detection method based on a finite state automaton and a detection system. A general protocol group of an Internet of things terminal is modeled through adoption of a finite state automaton principle, moreover, real-time monitoring and modeling are carried out for actions performed by the Internet of things terminal in interaction, and the actions are matched with normal interaction behaviors predicted by the finite state automaton, so abnormal attack behaviors are judged. According to the method and the system, a complex Internet of things system can be expressed by a labeled transition system, so a demand of IDSs (Intrusion Detection Systems) for a storage space is reduced to a great extent. Moreover, the complexity of a comparison algorithm is decided according to the depth of a Glued-IOLTS (labeled transition system) graph of a corresponding Internet of things device operation protocol, so the Internet of things intrusion detection method based on the finite state automaton can be applied to an Internet of things system. The method and the device are characterized by low mass, few occupied resources and high performing efficiency, are convenient for use and are relatively low in investment cost.

Description

technical field [0001] The invention belongs to the technical field of mobile communication network security of the Internet of Things, and in particular relates to an intrusion detection method of the Internet of Things based on a finite automaton. Background technique [0002] The Internet of Everything has become the main trend of future network development, and the Internet of Things has become the main direction of future 5G network development because it can greatly expand the network boundary of the Internet. Research and investment on the Internet of Things has gradually become the consensus of current high-tech companies. However, on the one hand, due to the low performance of most IoT terminal devices and insufficient single-point computing capabilities; the physical distribution of terminal devices is relatively wide, and they are easy to be captured by opponents; the network topology is flexible and easy to launch attacks from within the network. The security pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L63/08H04L63/1416
Inventor 付玉龙闫峥李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products