A security threat monitoring and defense system and method for an Internet of Things system

An IoT system and threat detection technology, applied in the field of IoT system security threat monitoring and defense systems, can solve problems such as poor compatibility, difficulty in deploying security threats, and no support for multiple traffic security detections.

Active Publication Date: 2021-04-02
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The traffic detection scheme has the following defects: incomplete support for IoT-specific protocols, no support for multiple traffic security detections, no global linkage analysis, and difficulties in finding security threats in separate deployments;
[0006] (2) The asset equipment agent solution has the following defects: the installation of the agent program on the asset equipment requires the asset equipment to have a certain computing power, and there are problems such as poor compatibility and difficulty in finding security threats when deployed separately;
[0007] (3) The WEB application firewall solution has the following defects: Deploying a WEB application firewall on the front end of the WEB service / API service requires a certain amount of server resources, and deploying alone cannot discover the security issues of the terminal itself, the security issues of the terminal and the third-party network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security threat monitoring and defense system and method for an Internet of Things system
  • A security threat monitoring and defense system and method for an Internet of Things system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Such as figure 1 As shown, an Internet of Things system security threat monitoring and defense system includes a traffic anomaly analysis system, an Internet of Things terminal anomaly analysis system, a business anomaly analysis system, an HTTP anomaly analysis system, and a threat detection and intelligence generation system. The intelligence generation system is connected with the traffic anomaly analysis system, the IoT terminal anomaly analysis system, the business anomaly analysis system, and the HTTP anomaly analysis system respectively.

[0070] Specifically, the traffic anomaly analysis system is used to realize asset discovery, traffic security detection, and threat analysis by analyzing traffic data, and report the analyzed security threat events to the threat detection and intelligence generation system; and in this embodiment, the The traffic anomaly analysis system includes a traffic anomaly analysis unit and a number of traffic detection devices, and the ...

Embodiment 2

[0076] Such as figure 2 As shown, a method for monitoring and defending against a security threat of an Internet of Things system is realized through the above-mentioned system for monitoring and defending against a security threat of an Internet of Things system, and specifically includes the following steps:

[0077] A1. Deploy traffic detection equipment on port X of the IoT terminal network switch, so as to mirror the traffic of other ports to be analyzed on the IoT terminal network switch to switch port X;

[0078] A2. The traffic detection device analyzes and obtains the asset attribute information of the protocol according to the protocol identification feature library, asset service feature library, mac address prefix feature library, and the obtained IoT protocol information. The asset attribute information includes at least source information and destination mac Information, source IP information, destination IP information, asset service information;

[0079] As a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things system security threat monitoring and defending system. The system comprises a traffic abnormality analysis system, an Internet of Things terminal abnormality analysis system, a service abnormality analysis system, an HTTP abnormality analysis system and a threat detection and information generation system. The threat detection and information generation system is electrically connected with the flow abnormity analysis system, the Internet of Things terminal abnormity analysis system, the service abnormity analysis system and the HTTP abnormity analysis system. The system provided by the invention can simultaneously solve the own safety problems of the equipment terminals, the terminal-cloud interaction safety problem and the own safety problemof a cloud, including the interaction safety problem of a third-party cloud, in an Internet of Things.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a system and method for monitoring and defending security threats of an Internet of Things system. Background technique [0002] With the rapid development of the Internet of Things, the development of the country has entered the era of intelligent Internet of Things. In various physical environments such as homes, corporate offices, factory production, traffic management, aviation halls, hospital halls, etc., the Internet of Things is almost everywhere, and the Internet of Things is safe. Threats are also growing. [0003] At present, in the Internet of Things environment, there are more and more security issues in the Internet of Things, and the devices in the Internet of Things are becoming more and more complex. Self-owned networks and third-party networks exist at the same time, and it is difficult to discover and defend security through certain devices o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1425H04L63/1441H04L63/1466H04L63/20H04L67/02H04L67/12
Inventor 常清雪龚致文有庆
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products