Fog computing intrusion detection feature sharing system based on block chain technology

An intrusion detection and sharing system technology, applied in the field of information security, to achieve the effect of improving accuracy, reducing false alarm rate, and reducing the risk of being attacked

Active Publication Date: 2020-04-28
UNIV OF SCI & TECH BEIJING +1
View PDF13 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to provide a fog computing intrusion detection feature sharing system based on blockchain technology. By introducing blockchain technology, the problem of data sharing between nodes without a trusted third party is solved, and it can Ensure that the content of the intrusion detection sign

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fog computing intrusion detection feature sharing system based on block chain technology
  • Fog computing intrusion detection feature sharing system based on block chain technology
  • Fog computing intrusion detection feature sharing system based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0032] In order to better understand the fog computing intrusion detection feature sharing system based on the blockchain technology provided by the embodiment of the present invention, a brief description of the blockchain technology is given first:

[0033] Blockchain technology is a distributed ledger that protects the data in the block from being tampered with and forged in a cryptographic way. The issue of sole authority and trust of the centralized organization, storing data in the blockchain can realize the traceability and tamper-proof of the data, and then realize the transparency and reliability of the data.

[0034] Such as figure 1 As shown, the fog computing intrusion detection feature sharing system based on blockchain technology provided ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fog computing intrusion detection feature sharing system based on a block chain technology, which can ensure the security of content of an intrusion detection feature libraryand is beneficial to improving the intrusion detection accuracy. The system comprises an identity authentication module used for carrying out identity authentication on a node to be added into an alliance chain, and if the authentication is passed, allowing the node to be added into the alliance chain; a feature sharing module used for broadcasting any node A added into the alliance chain to a network for sharing if the node A shares the updated intrusion detection feature library; and a feature verification module used for carrying out correctness verification on the intrusion detection feature library broadcasted in the network by other nodes in the network, and if the verification is passed, storing the intrusion detection feature library in a block chain system in an uplink manner. Theinvention relates to the technical field of information security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a fog computing intrusion detection feature sharing system based on block chain technology. Background technique [0002] In recent years, with the further development of the Internet of Things and big data technology, more and more end-user devices (ie: nodes, such as mobile phones, notebooks, etc.) However, as an emerging computing paradigm, there are still many security issues in fog computing. [0003] In order to identify threats in the network, intrusion detection systems have been widely used in computer networks, and there are misuse detection and anomaly detection according to the detection methods; among them, [0004] Misuse detection first needs to analyze the attack situation, then write the corresponding detection rules and feature models, and detect by pattern matching the existing features with the monitored data, because it can only be done accordin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/33
CPCG06F21/55G06F21/33
Inventor 林福宏鞠伟佳周成成陆月明许海涛安建伟
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products