Network security protection method and device and electronic device

A technology of network security and terminal equipment, applied in the field of network security, can solve problems such as insufficient security defense performance of the Internet of Things to meet actual needs, damage to the perceived data security of the Internet of Things, and damage to the Internet of Things

Inactive Publication Date: 2017-10-10
紫光恒越技术有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the characteristics of the sensing layer nodes of the Internet of Things, the sensing layer nodes are extremely vulnerable to intrusion attacks. If the network is invaded and illegal or bad data flows into the Internet of Things through the sensing layer devices, it will not only destroy the perception data of the Internet of Things security, and will endanger the data security of the information transmi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and device and electronic device
  • Network security protection method and device and electronic device
  • Network security protection method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] figure 1 A schematic flow diagram of the network security defense method provided by the embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0064] In step S101, the terminal device acquires environmental data that changes over time, and the environmental data includes one or more of light intensity, temperature, humidity, pressure, gravity, vibration frequency, position, speed, acceleration, and volume.

[0065] The perception layer of the Internet of Things is equipped with environmental data collection nodes for collecting environmental data. The terminal device is set at the perception layer of the Internet of Things, and the collected environmental data is transmitted to the Internet of Things through the setting of the terminal device. For example, the perception layer of the Internet of Things is equipped with multiple sensor acquisition boards, and the sensor acquisition boards are equipped with sensors. ...

Embodiment 2

[0107] Figure 5 A schematic diagram of the module composition of the network security defense device provided by the embodiment of the present invention, such as Figure 5 As shown, the device includes:

[0108] The data acquisition module 51 is configured to acquire environmental data that changes over time through the terminal device, wherein the environmental data includes one or more of light intensity, temperature, humidity, pressure, gravity, vibration frequency, position, speed, acceleration, and volume kinds of data;

[0109] Calculation and judgment module 52, used to calculate the fluctuation amount of the environmental data at the current moment relative to the environmental data at adjacent moments, and judge whether the fluctuation amount is greater than the set fluctuation amount threshold;

[0110] The feature extraction module 53 is used to obtain the program to be detected at the current moment of the terminal device when the judgment result of the calculat...

Embodiment 3

[0124] see Figure 6 , the embodiment of the present invention also provides an electronic device 100, including: a processor 40, a memory 41, a bus 42 and a communication interface 43, the processor 40, the communication interface 43 and the memory 41 are connected through the bus 42; Executable modules, such as computer programs, stored in the execution memory 41 .

[0125] Wherein, the memory 41 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 43 (which may be wired or wireless), and the Internet, wide area network, local network, metropolitan area network, etc. can be used.

[0126] The bus 42 may be an ISA bus, a PCI bus or an EISA bus, etc. The bus can be divided into address bus, data bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security protection method, device and an electronic device and relates to the technical field of network security. The method comprises the steps of obtaining environmental data changing along with time through a terminal device; calculating the fluctuation quantity of the environmental data at current moment relative to the environmental data at the adjacent moment and judging whether the fluctuation quantity is greater than a set fluctuation quantity threshold or not; if so, obtaining a to-be-detected program of the terminal device at the current moment, extracting an operation code of the to-be-detected program and determining characteristics of the to-be-detected program according to the operation code; determining a characteristic vector corresponding to the to-be-detected program according to the characteristic of the to-be-detected program and a characteristic library obtained in advance; detecting the characteristic vector by using the trained classifier and judging whether the to-be-detected program is a malicious program or not; and if so, determining that an attack event appears in the terminal device and carrying out protection control on the terminal device. The abnormal condition of a physical network sensing layer can be timely found out and the security protection performance of the Internet of Things is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security defense method, device and electronic equipment. Background technique [0002] The Internet of Things is a comprehensive information system that connects things and things with perception as the core. Through intelligent perception, recognition technology and pervasive computing and other communication perception technologies, it is widely used in the fusion of networks. It is called the world information after computers and the Internet. The third wave of industrial development. [0003] The Internet of Things includes a perception layer, an information transmission layer, and an information processing layer. The Internet of Things has high requirements for data security, especially at the perception layer. Due to the characteristics of the sensing layer nodes of the Internet of Things, the sensing layer nodes are extremely vulnerable to intrusion a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G01D21/02
CPCH04L63/1416G01D21/02H04L63/145
Inventor 李晓昱张三三琚亚明
Owner 紫光恒越技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products