Security defense and abnormity detection method, device and system based on MQTT message queue

A detection method and message queue technology, applied in transmission systems, electrical components, etc., can solve problems such as low security performance, low security defense capabilities, and low abnormal behavior detection capabilities, so as to prevent leakage and theft, and avoid potential safety hazards , the effect of fine control

Active Publication Date: 2019-09-20
杨鲲
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of low security performance, low security defense capability, and low abnormal behavior detection capability i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense and abnormity detection method, device and system based on MQTT message queue
  • Security defense and abnormity detection method, device and system based on MQTT message queue
  • Security defense and abnormity detection method, device and system based on MQTT message queue

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0072] Example one:

[0073] In order to more clearly illustrate the process and advantages of the method of the present embodiment, the present invention provides an abnormal behavior detection method based on MQTT message queue.

[0074] figure 1 This is a schematic flow chart of a method for detecting abnormal behavior based on MQTT message queues according to an embodiment of the present invention.

[0075] See figure 1 The method for detecting abnormal behavior based on the MQTT message queue provided by the embodiment of the present invention may include the following steps:

[0076] S11. Receive the message data sent by the target terminal within the preset sampling time, and perform statistics on the message data.

[0077] Specifically, the target terminal here refers to various embedded terminal devices in the Internet of Things, and the MQTT client program is implemented on these terminal devices.

[0078] According to requirements, a certain sampling time is preset, and the sa...

Example Embodiment

[0092] Embodiment two:

[0093] In order to further explain the abnormal behavior detection method based on the MQTT message queue provided by the embodiment of the present invention, the present invention also provides another embodiment.

[0094] figure 2 This is a schematic flow diagram of another method for detecting abnormal behavior based on an MQTT message queue according to an embodiment of the present invention.

[0095] See figure 2 On the basis of the above-mentioned embodiment, the present invention provides another method for detecting abnormal behavior based on MQTT message queue, which may include the following steps:

[0096] S21: Receive the message data sent by the target terminal within the preset sampling time, and perform statistics on the message data.

[0097] S22. Determine a statistical period for statistical message data.

[0098] S23. Determine whether the sampling time is greater than the statistical period.

[0099] Wherein, steps S21 to S23 are the same as ...

Example Embodiment

[0122] Embodiment three:

[0123] In order to more clearly illustrate the process and advantages of the method of the present embodiment, the present invention provides a security defense method based on MQTT message queue.

[0124] image 3 It is a schematic flowchart of a security defense method based on an MQTT message queue provided by an embodiment of the present invention.

[0125] See image 3 , The security defense method based on MQTT message queue provided by the embodiment of the present invention may include the following steps:

[0126] S31. Receive a connection request from the target terminal.

[0127] The target terminal to access must implement the MQTT client program. The device terminal establishes a connection with the MQTT message broker through TCP, and uses the TLS encryption mechanism between the transport layer and the application layer to implement a secure socket.

[0128] Specifically, the access terminal implements the MQTT client program, the terminal implem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security defense and abnormity detection method, device and system based on an MQTT message queue. The invention belongs to the technical field of shortcut message queue application in Internet of Things. The method comprises the following steps that in preset sampling time, message data sent by a target terminal is received, the message data sent by the target terminal in one period are counted, the weighted Euclidean distance of the statistical result of the message data is calculated, whether the target terminal is an abnormal behavior terminal or not is judged by comparing the weighted Euclidean distance with a preset Euclidean distance threshold value, and the abnormal behavior terminal can be detected and obtained in time. According to the security defense method, blacklist screening, client authentication, client authorization, message issuing and abnormal detection are set in the connection process of the target terminal and the message agent, and the abnormal behavior detection method is called to safely filter the abnormal client, so that the whole message interaction process is safely and finely controlled.

Description

technical field [0001] The invention belongs to the technical field of fast message queue application in the Internet of Things, and in particular relates to a security defense and anomaly detection method, device and system based on an MQTT message queue. Background technique [0002] From the concept of the Internet of Things being proposed to the rapid development of the Internet of Things in recent years, we have also entered a new information age along with the wave of the Internet of Things. The transmission of messages in the Internet of Things has always been an important topic. The emergence of message queues has solved the problem of message transmission in the Internet of Things. [0003] The MQTT protocol is a publish / subscribe mode message transmission protocol that complies with the client-server architecture. Its lightweight, open source, and easy-to-implement characteristics perfectly fit many application scenarios, such as device-to-device communication (M2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416H04L63/1458H04L63/1466H04L63/101
Inventor 杨鲲向江南
Owner 杨鲲
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products