Unlock instant, AI-driven research and patent intelligence for your innovation.

Monitoring method, device, equipment and system

A technology for monitoring equipment and storage devices, applied in the field of IoT, can solve the problems of high cost, difficult traffic statistics of IoT devices, low accuracy and reliability of IoT devices, etc.

Active Publication Date: 2022-08-05
ALIBABA GRP HLDG LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, on the one hand, IoT devices may also generate network traffic during normal work, such as interacting with cloud servers, so it is difficult for routers to determine whether the generated network traffic is normal or abnormal; on the other hand, in order to improve communication Therefore, the cost of counting the network traffic of IoT devices is high, and it is gradually difficult to effectively monitor whether IoT devices are Under attack, i.e. IoT devices are monitored with low accuracy and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method, device, equipment and system
  • Monitoring method, device, equipment and system
  • Monitoring method, device, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] refer to figure 1 , showing a flow chart of a method for monitoring an IoT device according to an embodiment of the present application, where the IoT device includes a storage device for storing executable instructions, and the specific steps of the method include:

[0092] Step 101, monitoring the write event of the storage device.

[0093] Because when the IoT device is invaded, that is, attacked, in order to make the implanted malicious code persistent, the malicious code will be written to the storage device, so the write event of the storage device can be monitored, so as to facilitate the follow-up Write events for identification to determine whether to include an attack event on the IoT device.

[0094] The CPU of the IoT device and the storage device are usually preset with corresponding data interfaces, and the corresponding data interfaces are connected through data transmission lines such as physical buses, so as to ensure that the CPU can read or write dat...

Embodiment 2

[0104] refer to figure 2 , showing a flow chart of a method for monitoring an Internet of Things device according to an embodiment of the present application, where the Internet of Things device includes a storage device for storing executable instructions, and the monitoring device is independent of the Internet of Things device device of.

[0105] A physical bus can be used to physically contact the CPU of the IoT device and the data interface or data transmission line in the storage device, so as to monitor the write event. The form of software monitors this write event.

[0106] Among them, the monitoring device is a device independent of the IoT device. Therefore, the IoT device can be connected with the monitoring device through the reserved interface, so as to realize the monitoring of the IoT device, which can improve the compatibility of the monitoring device and further reduce monitoring. cost.

[0107] In the embodiment of the present application, optionally, be...

example 1

[0138] Example 1, when the key information includes the event time, the monitoring device can determine the frequency of consecutive write events according to the event time of the write event. If the frequency is greater than the preset write frequency, it means that the storage device is written to compare. Frequent, as can be seen from the foregoing, the frequency of writing to Flash etc. by the IoT device is relatively low, so the continuous writing event can be determined as an attack event. Or, since the normal writing of the IoT device to the storage device may include system repair or upgrade, etc., the system change time period corresponding to the IoT device can be obtained, and the event time is not within the system change time period. The write event is determined to be an attack event.

[0139] The preset writing frequency can be determined in advance by the monitoring device. For example, the relevant technical personnel can test the IoT device before the IoT de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Examples of this application provide a monitoring method, device, equipment and system, involving the field of Internet of Things technology.The method includes: monitoring the writing event of the storage device; identifying whether the writing event includes an attack event for the Internet of Things device.The embodiments of this application can improve the accuracy and reliability of the monitoring of the Internet of Things equipment, and reduce the monitoring cost.

Description

technical field [0001] The present application relates to the technical field of IoT (Internet of Things, Internet of Things), and in particular, to a monitoring method, device, device, and system. Background technique [0002] The Internet of Things technology is the third wave of the development of the world's information industry after the computer and the Internet. It can connect any item (that is, the Internet of Things device) with the Internet through information sensing equipment and according to the agreed protocol to exchange information. To achieve the purpose of intelligence and automation. [0003] With the application of the Internet of Things, the security issues of the Internet of Things devices have been paid more and more attention. In the prior art, the router connected to the Internet of Things can count the network traffic of the Internet of Things device, and determine whether the Internet of Things device is abnormal or invaded according to the size o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L43/02H04L43/08
Inventor 王康
Owner ALIBABA GRP HLDG LTD