Threat information generation and sharing system and method based on Internet of Things
A technology of the Internet of Things and Internet of Things terminals, applied in transmission systems, electrical components, etc., can solve problems such as the generation and management of the Internet of Things environment, the difficulty of sharing Internet of Things threat intelligence, and the lack of a unified threat intelligence generation method for the Internet of Things system.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] Such as figure 1 As shown, a threat intelligence generation and sharing system based on the Internet of Things includes a traffic anomaly analysis system, an Internet of Things terminal anomaly analysis system, a business anomaly analysis system, a honeypot analysis system, a WEB application firewall system, and a threat intelligence management system; The threat intelligence management system is respectively connected with the traffic anomaly analysis system, the Internet of Things terminal anomaly analysis system, the business anomaly analysis system, the honeypot analysis system, and the WEB application firewall system.
[0049]Specifically, the traffic anomaly analysis system is used to realize asset discovery and Internet of Things terminal network security risk detection. Specifically, through traffic mirroring, the traffic to be analyzed is mirrored to the traffic anomaly analysis system for analysis. The traffic anomaly analysis system analyzes the Internet of Th...
Embodiment 2
[0056] Such as figure 2 As shown, a method for generating and sharing threat intelligence based on the Internet of Things is implemented by the above-mentioned system for generating and sharing threat intelligence based on the Internet of Things, and specifically includes the following steps:
[0057] A. The traffic anomaly analysis system will report the detected security threat events and asset information to the threat intelligence management system;
[0058] Specifically: the traffic data to be analyzed is mirrored to the traffic anomaly analysis system through traffic mirroring, and then the traffic anomaly analysis system analyzes the received traffic data to realize asset discovery and IoT terminal network security risk detection. Finally, the traffic anomaly analysis system Report the analyzed security threat events and asset information to the threat intelligence management system.
[0059] B. The IoT terminal anomaly analysis system will report the detected securit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com