Internet-of-things vulnerability scanning system and scanning method

A vulnerability scanning and Internet of Things technology, applied in the Internet of Things vulnerability scanning system and scanning field, can solve problems such as low efficiency, affecting the quality of target network transmission, wireless network impact, etc., and achieve the effect of improving efficiency

Inactive Publication Date: 2017-09-12
UNIV OF JINAN
View PDF1 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This requires researchers to have a special understanding of the protocol itself and strong analysis capabilities, and it takes a lot of time, and it is offline analysis, which is slow and inefficient
[0007] 2. Simulation attack method: directly attack the wireless network (such as flood attack and denial of service attack, etc.), so as to judge the loopholes in the wireless network. This method cannot fully discover all loopholes in the wireless sensor network, and will It affects the wireless network, affects the transmission quality of the target network, and cannot determine the loopholes in the protocol itself, so it is not targeted
[0008] 3. Black box testing method: Send a large number of wrong or abnormal data packets to the target network, and then observe whether the target network can process these data packets normally or whether the network crashes, so as to determine whether there are loopholes in the target network. This method is also targeted weak, inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things vulnerability scanning system and scanning method
  • Internet-of-things vulnerability scanning system and scanning method
  • Internet-of-things vulnerability scanning system and scanning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0063] Such as Figure 1-7 As shown, an IoT vulnerability scanning device includes four modules, which are mainly divided into traffic sniffer, scanner, server, and Web visualization terminal. Next, the four modules are introduced:

[0064] 1. Traffic Interceptor: The traffic sniffer model provides a flexible bottom layer access to wireless communication. It is mainly used to passively monitor the communication traffic in the Internet of Things environment, and less active detection data packets. The current popular and low-cost software-defined radio technology is used to process the physical layer traffic, and then decapsulated and transmitted to the link layer. , being able to capture traffic packets of various protocols is a prerequisite, the system uses a device to process a protocol, so traffic sniffing devices include wireless network cards that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet-of-things vulnerability scanning system and a scanning method. The system comprises a traffic sniffer, a scanner, an Internet-of-things vulnerability scanning server and a Web visualization terminal which are connected in sequence. The traffic sniffer is used for passively listening to the communication traffic in an Internet-of-things environment, and actively sending a traffic detection data packet. The traffic sniffer processes the traffic in a physical layer of an actual Internet-of-things environment through software defined radio, decapsulates the traffic and then transmits the traffic to a link layer. The scanner is used for processing traffic data captured by the traffic sniffer, and further used for constructing a data packet and sending the data packet to a target Internet-of-things environment through the traffic sniffer. The beneficial effect is that a real-time online vulnerability analysis can be made and corresponding suggestions can be given.

Description

technical field [0001] The invention relates to an Internet of Things vulnerability scanning system and a scanning method. Background technique [0002] The communication technology protocol mainly adopted by the Internet of Things is wireless transmission, mainly including Wi-Fi, Bluetooth technology, Bluetooth low power consumption technology, ZigBee, Z-Wave and RFID. Compared with Ethernet, which uses optical fiber and wired channels for communication, the communication data of the Internet of Things is directly exposed to the air, so it is more vulnerable to attacks from intruders, and the nodes of the Internet of Things are limited by power, computing power, and storage capabilities. Indirectly, the IoT environment is vulnerable to external attacks. [0003] In the Internet of Things architecture, the perception layer where smart devices are located is at the bottom and the most basic level, and information security at this level is most likely to be threatened. In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L63/1433H04L41/12H04L41/22H04L43/04
Inventor 王宋飞杨星海寻飞飞解宇胡立彬苏玉瑞
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products