Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection method and system suitable for mqtt

A technology of security protection and gateway node, applied in the field of network security, can solve the problem of content cleaning method without mqtt, etc.

Inactive Publication Date: 2020-06-30
HANGZHOU TUYA INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the field of network security, all data entering the server may maliciously attack the server, but mqtt (message queue telemetry transmission) is a long link service, and there is no cleaning method for long link content in the prior art, and there is no mqtt content the cleaning method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system suitable for mqtt
  • Security protection method and system suitable for mqtt
  • Security protection method and system suitable for mqtt

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0032] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method suitable for mqtt, and the method comprises the steps: adding an agent for an mqtt gateway node, and enabling the agent to be used for data processing; sending a protection rule to the mqtt gateway node, wherein the mqtt gateway node performs protection according to the protection rule; and extracting data processing condition data of the agent.Compared with the prior art, the method has the following beneficial effects: security protection is carried out on the mqtt cluster of million qps, and data cleaning is realized. The abnormal link is intercepted; the abnormal IP is intercepted; an alarm for the interception event is intercepted; the interception and cleaning strategy of the whole cluster can be dynamically adjusted; intelligentlearning is carried out on intercepted events, attack characteristics and fields are automatically analyzed, and safety personnel are prompted to adjust safety strategies.

Description

technical field [0001] This application relates to the field of network security, in particular, to a security protection method suitable for mqtt. Background technique [0002] In the field of network security, all data entering the server may maliciously attack the server, but mqtt (message queue telemetry transmission) is a long link service, and there is no cleaning method for long link content in the prior art, and there is no mqtt content the cleaning method. Contents of the invention [0003] The main purpose of this application is to provide a security protection method suitable for mqtt, including: [0004] Add a proxy for the mqtt gateway node, and the proxy is used for data processing; [0005] Send protection rules to the mqtt gateway node, and the mqtt gateway node protects according to the protection rules; [0006] Extracting the data processing status data of the agent. [0007] Optionally, the data processing includes: content interception, content cle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0227H04L63/1466H04L63/1425
Inventor 何保良
Owner HANGZHOU TUYA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products