Internet of Things system security threat monitoring and defending system and method

An IoT system and defense system technology, which is applied in the field of IoT system security threat monitoring and defense systems, and can solve problems such as poor compatibility, difficulty in deploying security threats, and no support for multiple traffic security detections.

Active Publication Date: 2019-08-09
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The traffic detection scheme has the following defects: incomplete support for IoT-specific protocols, no support for multiple traffic security detections, no global linkage analysis, and difficulties in finding security threats in separate deployments;
[0006] (2) The asset equipment agent solution has the following defects: the installation of the agent program on the asset equipment requires the asset equipment to have a certain computing power, and there are problems such as poor compatibility and difficulty in finding security threats when deployed separately;
[0007] (3) The WEB application firewall solution has the following defects: Deploying a WEB application firewall on the front end of the WEB service / API service requires a certain amount of server resources, and deploying alone cannot discover the security issues of the terminal itself, the security issues of the terminal and the third-party network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things system security threat monitoring and defending system and method
  • Internet of Things system security threat monitoring and defending system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Such as figure 1 As shown, an IoT system security threat monitoring and defense system includes a traffic anomaly analysis system, an IoT terminal anomaly analysis system, a business anomaly analysis system, an HTTP anomaly analysis system, and a threat detection and intelligence generation system. The threat detection and The intelligence generation system is connected to the traffic anomaly analysis system, the IoT terminal anomaly analysis system, the business anomaly analysis system, and the HTTP anomaly analysis system.

[0070] Specifically, the traffic anomaly analysis system is used to realize asset discovery, traffic security detection, and threat analysis by analyzing traffic data, and report the analyzed security threat events to the threat detection and intelligence generation system; and in this embodiment, all The flow anomaly analysis system includes a flow anomaly analysis unit and a number of flow detection devices, and the flow detection device is deployed...

Embodiment 2

[0076] Such as figure 2 As shown, a method for security threat monitoring and defense of the Internet of Things system is implemented by the above-mentioned security threat monitoring and defense system of the Internet of Things system, which specifically includes the following steps:

[0077] A1. Deploy traffic detection equipment on port X of the IoT terminal network switch to mirror the traffic of other ports to be analyzed on the IoT terminal network switch to switch port X;

[0078] A2. The traffic detection device analyzes and obtains the asset attribute information of the protocol according to the protocol identification feature database, asset service feature database, mac address prefix feature database and the acquired Internet of Things protocol information, where the asset attribute information includes at least source information and destination mac Information, source IP information, destination IP information, asset service information;

[0079] Preferably, in this e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things system security threat monitoring and defending system. The system comprises a traffic abnormality analysis system, an Internet of Things terminal abnormality analysis system, a service abnormality analysis system, an HTTP abnormality analysis system and a threat detection and information generation system. The threat detection and information generation system is electrically connected with the flow abnormity analysis system, the Internet of Things terminal abnormity analysis system, the service abnormity analysis system and the HTTP abnormity analysis system. The system provided by the invention can simultaneously solve the own safety problems of the equipment terminals, the terminal-cloud interaction safety problem and the own safety problemof a cloud, including the interaction safety problem of a third-party cloud, in an Internet of Things.

Description

Technical field [0001] The invention relates to the technical field of the Internet of Things security, in particular to a system and method for monitoring and defending the security threats of the Internet of Things system. Background technique [0002] With the rapid development of the Internet of Things, the country's development has entered the era of intelligent Internet of Things. Various physical environments such as homes, corporate offices, factory production, traffic management, aviation halls, hospital halls, etc., the Internet of Things is almost everywhere, and the Internet of Things is safe. The threats are also increasing. [0003] At present, in the environment of the Internet of Things, there are more and more security issues in the Internet of Things, and the devices in the Internet of Things are becoming more and more complex. Both private networks and third-party networks exist at the same time. It is difficult to detect and defend security through certain equip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L63/1441H04L63/1466H04L63/20H04L67/02H04L67/12
Inventor 常清雪龚致文有庆
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products