Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion detection method based on mqtt protocol

An intrusion detection and protocol technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as inability to prevent attacks, and achieve the effects of improving security and reliability, ensuring security, and preventing fraudulent attacks

Active Publication Date: 2020-03-10
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the packets of spoofing attacks conform to the rules of the MQTT protocol, traditional firewalls cannot recognize them, so they cannot prevent such attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method based on mqtt protocol
  • Intrusion detection method based on mqtt protocol
  • Intrusion detection method based on mqtt protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0038] Such as image 3 As shown, the MQTT communication topology includes a server and multiple clients, and a security protection module is added between the server and the client. After the intrusion detection method of this solution is deployed on the security protection module, the transmission of MQTT data packets can be refer to Figure 4 , after deploying the method of this scheme on the security protection module,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection method based on the MQTT protocol, which comprises the steps of capturing the MQTT data packet at port 1883 by using the Netfilter framework of Linux between the main station and the sub-station; extracting the first byte of the fixed header of the MQTT data packet Control message type value x 1 , the value x of the flag bit specifying the control packet type in the first byte of the fixed header 2 , the value x of the second byte of the fixed header 3 ; Extract the x from the MQTT packet 1 、x 2 and x 3 Combined into a set of data, the format of the data is X n =(x 1 , x 2 , x 3 ); the data is transmitted as an input to the neural network model to obtain a detection result; when the detection result is greater than a preset threshold, it indicates that the MQTT packet is a normal data packet, allowing it to pass; when the detection result is less than a preset threshold , indicating that the MQTT data packet is an abnormal data packet and is not allowed to pass.

Description

technical field [0001] The invention belongs to the field of Internet of Things information security, and in particular relates to an intrusion detection method based on the MQTT protocol. Background technique [0002] MQTT (MessageQueuing Telemetry Transport) is an instant messaging protocol developed by IBM and is an important part of today's Internet of Things. The protocol supports all platforms and can connect almost all networked items with the outside world, and is used as a communication protocol for sensors and actuators. The security of the MQTT protocol is very important to the IoT system. [0003] However, MQTT is an open protocol. Its message structure and data format are public, and without sufficient security measures, there are security risks. Attackers can use data messages that conform to the rules of the MQTT protocol to defraud Attacks, for example, during the transmission of MQTT protocol messages, attackers can use data packets that conform to MQTT pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/0236H04L63/1425H04L63/1441
Inventor 邹见效王斌于力徐红兵
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products