Internet of Things safety monitoring method and system based on double engines

A security monitoring and Internet of Things technology, applied in the transmission system, electrical components, etc., can solve the problems of equipment processing that cannot be violated, centralized management and control of IoT terminals that cannot be dispersed and isolated, etc., to enhance competitiveness, improve business quality and service Efficiency, avoidance of waste and churn effects

Inactive Publication Date: 2020-05-15
深圳市云盾科技有限公司
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above technical problems, the embodiment of the present invention provides a dual-engine-based IoT security monitoring method and system, which can solve the problem that the IoT in the prior art cannot centrally manage and control the scattered and isolated IoT terminals, and cannot promptly detect violations. Equipment to deal with technical issues in a timely manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things safety monitoring method and system based on double engines
  • Internet of Things safety monitoring method and system based on double engines
  • Internet of Things safety monitoring method and system based on double engines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0040] see figure 1 , figure 1 This is a schematic flowchart of an embodiment of a dual-engine-based IoT security monitoring method in an embodiment of the present invention. like figure 1 shown, including:

[0041] Step S100, pre-deploy the detection and disposal engine in the perception layer of the Internet of Things, and deploy the acquisition and analysis engine in the network layer of the Internet of Things;

[0042] Step S200, discov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things safety monitoring method and system based on double engines, and the method comprises the steps: deploying a detection processing engine in an Internet ofThings sensing layer in advance, and deploying a collection analysis engine in a network layer of the Internet of Things; discovering and identifying terminal equipment of the Internet of Things through a detection processing engine, obtaining equipment information of the terminal equipment, and reporting equipment attributes and equipment state information to an acquisition analysis engine; andacquiring, by the acquisition and analysis engine, flow data of a network core switch, constructing a network behavior analysis model of the terminal equipment according to the flow data and equipmentinformation of the terminal equipment, monitoring abnormal network behaviors by using the network behavior analysis model, and performing alarm and / or blocking operation. Through linkage of the two types of engines, terminal equipment discovery and identification and risk disposal are realized, centralized management and control and behavior analysis are performed on the dispersedly isolated Internet of Things terminals, the comprehensiveness and accuracy of behavior analysis and monitoring are improved, and the disposal efficiency is ensured.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a dual-engine based Internet of Things security monitoring method and system. Background technique [0002] In recent years, with the rapid development of the Internet of Things, big data and cloud computing technology, the era of the Internet of Everything has come, and the applications based on the Internet of Things have become more and more extensive in various fields, bringing revolutionary changes to today's social production and lifestyle. Compared with the traditional Internet, the structure of the Internet of Things is more complex. The perception layer has a wide variety of terminal devices, a large number, and a variety of interconnection protocols. More importantly, its extensibility is stronger, and the perception layer is far away from the core network layer and application layer. The above characteristics put forward higher requirements for the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1441
Inventor 张兵吴明由
Owner 深圳市云盾科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products