Internet of Things system security threat monitoring and defending system and method
An IoT system and defense system technology, which is applied in the field of IoT system security threat monitoring and defense systems, and can solve problems such as poor compatibility, difficulty in deploying security threats, and no support for multiple traffic security detections.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] Such as figure 1 As shown, an IoT system security threat monitoring and defense system includes a traffic anomaly analysis system, an IoT terminal anomaly analysis system, a business anomaly analysis system, an HTTP anomaly analysis system, and a threat detection and intelligence generation system. The threat detection and The intelligence generation system is connected to the traffic anomaly analysis system, the IoT terminal anomaly analysis system, the business anomaly analysis system, and the HTTP anomaly analysis system.
[0070] Specifically, the traffic anomaly analysis system is used to realize asset discovery, traffic security detection, and threat analysis by analyzing traffic data, and report the analyzed security threat events to the threat detection and intelligence generation system; and in this embodiment, all The flow anomaly analysis system includes a flow anomaly analysis unit and a number of flow detection devices, and the flow detection device is deployed...
Embodiment 2
[0076] Such as figure 2 As shown, a method for security threat monitoring and defense of the Internet of Things system is implemented by the above-mentioned security threat monitoring and defense system of the Internet of Things system, which specifically includes the following steps:
[0077] A1. Deploy traffic detection equipment on port X of the IoT terminal network switch to mirror the traffic of other ports to be analyzed on the IoT terminal network switch to switch port X;
[0078] A2. The traffic detection device analyzes and obtains the asset attribute information of the protocol according to the protocol identification feature database, asset service feature database, mac address prefix feature database and the acquired Internet of Things protocol information, where the asset attribute information includes at least source information and destination mac Information, source IP information, destination IP information, asset service information;
[0079] Preferably, in this e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com