Video monitoring equipment attack detection system based on memory behavior characteristics

A technology for video surveillance and attack detection, applied in the field of network security, can solve the problems of poor real-time performance, lack of reference indicators, and high system overhead, and achieve the effects of improving accuracy, reducing attack detection time, and being easy to deploy.

Inactive Publication Date: 2020-06-19
北京安为科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention overcomes the problems of large system overhead, poor real-time performance, and lack of commonality of reference indicators in the existing intrusion detection system for embedded devices. The difference in frequency of call numbers provides an attack detection system that can be used by upgrading the operating system kernel. The video surveillance equipment is used as the prototype system, and the in-system extraction module of memory feature data is used to adopt appropriate dimensionality reduction and aggregation. Class algorithm, providing effective analysis and representation of memory characteristic data, realizing the construction of normal memory behavior model of the system and detection and analysis of abnormal behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video monitoring equipment attack detection system based on memory behavior characteristics
  • Video monitoring equipment attack detection system based on memory behavior characteristics
  • Video monitoring equipment attack detection system based on memory behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions of the embodiments of the present invention in conjunction with the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments are the Part of the embodiments of the invention, rather than all the embodiments, based on the described embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work, all belong to the protection scope of the present invention .

[0053] The embodiment of the present invention provides a video surveillance device attack detection system based on memory behavior characteristics, which analyzes its characteristics in memory behavior from the exploit mechanism of vulnerabilities, selects the frequency of system call numbers as memory characteris...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video monitoring equipment attack detection system based on memory behavior characteristics, and the system comprises a collection module which is used for collecting the memory behavior characteristics of video monitoring equipment, and capturing the frequency of each system call number generated by the system through modifying the system kernel of the video monitoring equipment; the storage module is used for timely and effectively storing the memory behavior characteristics of the video monitoring equipment and storing the access density map of each system call number; the model construction module is used for constructing a memory behavior model of the video monitoring equipment and carrying out dimension reduction processing and clustering processing on the acquired memory characteristic data; the detection and alarm module is used for detecting the current attack behavior of the video monitoring equipment and giving an alarm; and the test module is usedfor simulating attack behaviors of the video monitoring equipment and testing the performance of the detection and alarm module. The system can describe different types of attacks by calling the density map through the system.

Description

technical field [0001] The invention belongs to the field of network security. By associating embedded system memory behavior with specific attack examples, a video surveillance equipment behavior model is constructed, and a video surveillance equipment attack detection system based on memory behavior characteristics is designed and proposed. Background technique [0002] With the continuous development of computer technology and communication technology, video surveillance equipment has been more and more widely used in daily production and life along with new information technology application modes such as "Internet of Things" and "Smart City". As an embedded device, video surveillance equipment has limited internal resources and a harsh operating environment, resulting in a large number of security mechanisms that cannot be used due to the extreme limitations of computing power and system operating conditions (such as delay constraints, inability to stop updates, etc.). ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F11/32
CPCG06F21/55G06F11/327
Inventor 党相凛许宝东何云华肖珂
Owner 北京安为科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products