Internet of Things malicious traffic detection method based on fog computing platform

A detection method and technology for malicious traffic, applied in the field of network security, can solve problems such as system and network security threats, limited hardware level of deployment framework, and difficulty in detecting malicious traffic.

Active Publication Date: 2020-08-07
SHANDONG UNIV
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the fourth quarter of 2016, the total number of DDoS attacks increased by 14% in the fourth quarter of 2017. DDoS attacks have caused serious security threats to systems and networks. According to the latest research, almost all DDoS attackers will use More than two vector attack methods are used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things malicious traffic detection method based on fog computing platform
  • Internet of Things malicious traffic detection method based on fog computing platform
  • Internet of Things malicious traffic detection method based on fog computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A method for detecting malicious Internet of Things traffic based on a fog computing platform. The detection method runs on a fog computing platform. The fog computing platform includes several distributed fog computing nodes, such as figure 1 As shown, the fog computing node includes a fog architecture gateway node module, an agent node module, a general computing node module and a data storage node module;

[0066] Fog Gateway Nodes (FGN) serve as a dynamic access point between the IoT device network and the local switch, and between the IoT device network and the Internet;

[0067] Agent node module (Broker Nodes), when the fog architecture gateway node module cannot meet the computing needs of IoT devices under its jurisdiction, the agent node module represents the fog architecture gateway node module, and communicates with the general computing node module or data storage node module or cloud data center Communication; to provide resources required by IoT devices; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of Things malicious traffic detection method based on a fog computing platform, and the detection method is operated based on the fog computing platform, and comprises the steps: (1) building an experimental network, and building a feature extraction module which is used for collecting a traffic data packet of IoT equipment under jurisdiction; building a Miraibotnet environment, and obtaining a traffic data packet when a DDoS attack is initiated; (2) performing feature value classification and extraction on the traffic data packet by using a feature extraction module to generate feature data; (3) by a data processing module, performing data dimension reconstruction on the feature data; and (4) building a convolutional neural network on the fog computing node. According to the method, the convolutional neural network anomaly detection algorithm is transplanted to the field of IoT botnets, so that the identification rate of DDoS malicious traffic ofIoT equipment is improved; based on fog computing platform architecture construction, real-time detection of abnormal traffic of IoT equipment under jurisdiction is realized, and consequences of DDoSattacks are reduced.

Description

technical field [0001] The invention relates to a method for detecting malicious traffic of the Internet of Things based on a fog computing platform, and belongs to the technical field of network security. Background technique [0002] Distributed denial of service attack (DDoS, distributed denial of service) is a highly harmful distributed and large-scale coordinated network attack method. , referred to as IoT) devices, while launching a denial of service attack (DoS, denial of service) to the attacked target, which eventually causes the system resources of the attacked target to be exhausted or even collapse, and the attacked target "refuses" to provide the required services for normal users. DDoS attacks mainly target the system resources and network bandwidth of the attacked target, and the attack range includes the network layer to the application layer. In October 2016, the Mirai botnet controlled more than 100,000 IoT devices to carry out distributed denial-of-servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1416H04L63/1458G06N3/08H04L2463/144G06N3/045
Inventor 王洪君韩长江许莹
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products