A device and a method for security lateral comparative analysis of Internet-of-Things

A comparative analysis, Internet of Things technology, applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as inability to accurately and effectively capture risk activities, low efficiency, lack of security modules, etc., to achieve rapid and efficient risk. Effects of Perception Methods

Active Publication Date: 2018-12-07
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem solved by the present invention is that in the prior art, the network risks of IoT devices are perceived through traditional firewall devices, intrusion detection devices, access devices, etc., or the possible abnormalities of a single device are manually analyzed. Since the IoT device itself does not have a "security module", traditional devices such as exte

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device and a method for security lateral comparative analysis of Internet-of-Things
  • A device and a method for security lateral comparative analysis of Internet-of-Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0029] The present invention relates to a method for comparing and analyzing the security of the Internet of Things horizontally. The Internet of Things includes a cloud center and a device communicatively connected with the cloud center. The method includes the following steps.

[0030] Step 1: Divide several areas in the cloud center according to the area network segment pre-configured by the user.

[0031] In the step 1, the several areas divided in the cloud center may include several large block areas, and any one of the large block areas includes several small block areas.

[0032] In the present invention, the division of regions mainly depends on the regional asset network segment configured in advance by the user. For example, the user configures the regional asset IP network segment of Han...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a device and a method for security lateral comparative analysis of the Internet-of-Things. The Internet-of-Things comprises a cloud center and a device for communicating withthe cloud center. The device comprises a communication module, a statistical module, a comparative analysis module and a database. According to preset regional network segments set by a user, the userdivides the cloud center into several regions, obtains the data of the devices in any region, records the data to the database, constructs a white list, obtains the data of any device in the currentregion one by one, compares the data with the white list in the database, and reports the abnormal data to the cloud center. On the basis of collecting the data information of the device of the Internet-of-Things in the region, through the statistical principle, lateral comparative analysis of the multi-dimensional information and status of the Internet-of-Things device is carried out, and the abnormal attack activities of the Internet-of-Things device are explored quickly, so a faster and more efficient risk perception method is provided to users, and the ability of zero day risk perception is exhibited to a certain extent.

Description

technical field [0001] The present invention relates to the technical field of data exchange network, in particular to a device and method for laterally comparing and analyzing similar data in IoT devices to screen out suspicious data for further judgment. Background technique [0002] The Internet of Things is an Internet where things are connected. Its core and foundation are still the Internet. It is an extension of the Internet and a further expanded network. Its client end extends and expands to any item for information exchange and communication. [0003] With the popularity of IoT devices, the network security situation awareness capabilities of IoT devices have also attracted much attention. How to quickly and effectively mine the network risk situation of IoT devices is a problem. [0004] In the existing technology, it mainly relies on traditional firewall equipment, intrusion detection equipment, access equipment, etc. to perceive the network risk of IoT equipment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/56G06F21/6218
Inventor 王世晋范渊王辉莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products