Monitoring method, device, equipment and system
A technology for monitoring equipment and storage devices, applied in the field of IoT, can solve the problems of high cost, difficult traffic statistics of IoT devices, low accuracy and reliability of IoT devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] refer to figure 1 , showing a flow chart of a method for monitoring an IoT device according to an embodiment of the present application, where the IoT device includes a storage device for storing executable instructions, and the specific steps of the method include:
[0092] Step 101, monitoring the write event of the storage device.
[0093] Because when the IoT device is invaded, that is, attacked, in order to make the implanted malicious code persistent, the malicious code will be written to the storage device, so the write event of the storage device can be monitored, so as to facilitate the follow-up Write events for identification to determine whether to include an attack event on the IoT device.
[0094] The CPU of the IoT device and the storage device are usually preset with corresponding data interfaces, and the corresponding data interfaces are connected through data transmission lines such as physical buses, so as to ensure that the CPU can read or write dat...
Embodiment 2
[0104] refer to figure 2 , showing a flow chart of a method for monitoring an Internet of Things device according to an embodiment of the present application, where the Internet of Things device includes a storage device for storing executable instructions, and the monitoring device is independent of the Internet of Things device device of.
[0105] A physical bus can be used to physically contact the CPU of the IoT device and the data interface or data transmission line in the storage device, so as to monitor the write event. The form of software monitors this write event.
[0106] Among them, the monitoring device is a device independent of the IoT device. Therefore, the IoT device can be connected with the monitoring device through the reserved interface, so as to realize the monitoring of the IoT device, which can improve the compatibility of the monitoring device and further reduce monitoring. cost.
[0107] In the embodiment of the present application, optionally, be...
example 1
[0138] Example 1, when the key information includes the event time, the monitoring device can determine the frequency of consecutive write events according to the event time of the write event. If the frequency is greater than the preset write frequency, it means that the storage device is written to compare. Frequent, as can be seen from the foregoing, the frequency of writing to Flash etc. by the IoT device is relatively low, so the continuous writing event can be determined as an attack event. Or, since the normal writing of the IoT device to the storage device may include system repair or upgrade, etc., the system change time period corresponding to the IoT device can be obtained, and the event time is not within the system change time period. The write event is determined to be an attack event.
[0139] The preset writing frequency can be determined in advance by the monitoring device. For example, the relevant technical personnel can test the IoT device before the IoT de...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


