Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for detecting abnormal behaviors of Internet of Things based on machine learning technology

A machine learning and IoT technology, applied in the field of Internet of Things security, can solve problems such as undetectability and achieve the effect of reducing losses

Active Publication Date: 2019-08-02
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the field of IoT, the vast majority of threats currently come from hardware cracking or near-field communication attacks on IoT terminals. At the level of communication between devices and IoT clouds, there are almost no IoT attack threats, so there is no corresponding response. Threat detection and identification based on the rules of the Internet of Things, resulting in the failure to discover the threats hidden in the communication protocol of the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] A method for detecting abnormal behavior of the Internet of Things based on machine learning technology is used to discover unknown threats in communication messages of the Internet of Things, comprising the following steps:

[0033] A. Collect the Internet of Things protocol data; wherein, the collected Internet of Things protocol data includes http protocol data, MQTT protocol data, XMPP protocol data; as a preference, in this embodiment, when collecting the Internet of Things protocol data, it is specifically in the Internet of Things cloud server Collect traffic at the entrance and exit.

[0034] At the same time, in step A, the collected Internet of Things protocol data is flow data or parsed message data, and if the collected Internet of Things protocol data is flow data, then in step A, the collected flow data also needs to be analyzed. Message parsing and restoration.

[0035] B. Perform feature processing on the collected data, and distinguish whether the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting abnormal behaviors of the Internet of Things based on a machine learning technology. The method comprises the following steps: A, collecting protocol data of the Internet of Things; b, performing feature processing on the collected data, and distinguishing whether the data belongs to a numerical type or a character type according to key values in thedata; if the character type belongs to the numeric type, entering the step C, and if the character type belongs to the character type, entering the step D; C, performing periodic behavior calculationon the data belonging to the numerical type, modeling by utilizing a machine learning algorithm, and predicting abnormal data; and D, performing word segmentation processing on the data belonging to the character type to judge the character entropy, performing machine learning algorithm modeling, and calculating outliers so as to distinguish abnormal data. According to the method, the normal flowcharacteristics of the Internet of Things are analyzed by utilizing a machine learning algorithm, so that the flow behavior is predicted.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a method for detecting abnormal behavior of the Internet of Things based on machine learning technology. Background technique [0002] In the field of IoT, the vast majority of threats currently come from hardware cracking or near-field communication attacks on IoT terminals. At the level of communication between devices and IoT clouds, there are almost no IoT attack threats, so there is no corresponding response. Threat detection and identification are carried out according to the rules, so that the threats hidden in the communication protocol of the Internet of Things cannot be discovered. [0003] Therefore, a method for detecting abnormal behavior of the Internet of Things based on machine learning technology can be formulated, using machine learning algorithms to analyze the normal traffic characteristics of the Internet of Things, and predict the traffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06N20/00
CPCG06N20/00H04L63/1425
Inventor 常清雪江佳峻龚致
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products