Security defense and abnormity detection method, device and system based on MQTT message queue
A detection method and message queue technology, applied in transmission systems, electrical components, etc., can solve problems such as low security performance, low security defense capabilities, and low abnormal behavior detection capabilities, so as to prevent leakage and theft, and avoid potential safety hazards , the effect of fine control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0072] Example one:
[0073] In order to more clearly illustrate the process and advantages of the method of the present embodiment, the present invention provides an abnormal behavior detection method based on MQTT message queue.
[0074] figure 1 This is a schematic flow chart of a method for detecting abnormal behavior based on MQTT message queues according to an embodiment of the present invention.
[0075] See figure 1 The method for detecting abnormal behavior based on the MQTT message queue provided by the embodiment of the present invention may include the following steps:
[0076] S11. Receive the message data sent by the target terminal within the preset sampling time, and perform statistics on the message data.
[0077] Specifically, the target terminal here refers to various embedded terminal devices in the Internet of Things, and the MQTT client program is implemented on these terminal devices.
[0078] According to requirements, a certain sampling time is preset, and the sa...
Example Embodiment
[0092] Embodiment two:
[0093] In order to further explain the abnormal behavior detection method based on the MQTT message queue provided by the embodiment of the present invention, the present invention also provides another embodiment.
[0094] figure 2 This is a schematic flow diagram of another method for detecting abnormal behavior based on an MQTT message queue according to an embodiment of the present invention.
[0095] See figure 2 On the basis of the above-mentioned embodiment, the present invention provides another method for detecting abnormal behavior based on MQTT message queue, which may include the following steps:
[0096] S21: Receive the message data sent by the target terminal within the preset sampling time, and perform statistics on the message data.
[0097] S22. Determine a statistical period for statistical message data.
[0098] S23. Determine whether the sampling time is greater than the statistical period.
[0099] Wherein, steps S21 to S23 are the same as ...
Example Embodiment
[0122] Embodiment three:
[0123] In order to more clearly illustrate the process and advantages of the method of the present embodiment, the present invention provides a security defense method based on MQTT message queue.
[0124] image 3 It is a schematic flowchart of a security defense method based on an MQTT message queue provided by an embodiment of the present invention.
[0125] See image 3 , The security defense method based on MQTT message queue provided by the embodiment of the present invention may include the following steps:
[0126] S31. Receive a connection request from the target terminal.
[0127] The target terminal to access must implement the MQTT client program. The device terminal establishes a connection with the MQTT message broker through TCP, and uses the TLS encryption mechanism between the transport layer and the application layer to implement a secure socket.
[0128] Specifically, the access terminal implements the MQTT client program, the terminal implem...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap