A system and method for comprehensively evaluating security of Internet of things system

An IoT system and comprehensive assessment technology, applied in the field of IoT system security comprehensive assessment, which can solve problems such as complexity, lack of external perspective, and difficulties

Inactive Publication Date: 2018-12-11
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical defects of this method are: (1) This method must deploy detection nodes and attack nodes, and the evaluation depends on the cooperation of the two, which is complicated and difficult; (2) This method lacks an external perspective similar to that of hackers, and hackers generally use remote Scanning vulnerability method for malicious penetration; (3) This method does not take human and management factors into consideration, often vulnerabilities are caused by management or human factors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for comprehensively evaluating security of Internet of things system
  • A system and method for comprehensively evaluating security of Internet of things system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] First of all, it should be explained that the present invention relates to network security technology, and is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software functional modules include but are not limited to: information entry module, remote scanning module, traffic analysis module, risk assessment module, traffic monitoring module, weak password library, PoC detection module, PoC detection script library and CVE vulnerability library, etc. All the items mention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security evaluation technology, aiming at providing a security comprehensive evaluation system and a security evaluation method of an Internet of Things system. In the computer of the system, an information input module, an remote scanning module and an flow analysis module are connected to an risk assessment module by electrical connection. The cloud end serverof the Internet of Things is respectively connected with each Internet of Things device through the Internet, and a flow monitoring module is respectively arranged on the cloud end server of each device of Internet of Things, and each flow monitoring module is bypassed to the flow analysis module and the remote scanning module in an electrical connection mode; The remote scanning module contains aweak password library, PoC detection module and PoC detection script library, and PoC probe. The invention considers the factor of the administrator, and carries out analysis together with the remotesafety scanning and the flow monitoring, and comprehensively carries out safety assessment and analysis. Without intruding into the existing Internet of Things system, neither probes are added in theInternet of Things equipment, nor affect the original Internet of Things cloud server is affected.

Description

technical field [0001] The invention relates to network security assessment technology, in particular to a comprehensive security assessment method for an Internet of Things system. Background technique [0002] The Internet of Things represented by IP cameras is an integrated system composed of many Internet of Things devices and cloud management centers. While this cloud-pipe-device architecture brings convenience to people's lives, it also brings difficulties to security evaluation. Specifically, the system architecture is complex, and there may be security risks in IoT devices and the cloud. The interaction between them expands the complexity, and managers' understanding of security and assets also directly affect the overall security. cyber security. [0003] In recent years, IoT products have developed rapidly, especially network camera products. Manufacturers represented by Dahua, Hikvision, etc. have made these smart devices emerge in IoT products, based on embedd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1433H04L63/1458H04L63/20
Inventor 渠敬斌范渊黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products