Dynamic security protection method and system for industrial Internet

An industrial Internet and dynamic security technology, applied in the Internet field, can solve problems such as waste of human resources

Inactive Publication Date: 2021-01-15
唐琪林
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, industrial Internet security work needs to start with the system construction and security management of security protection measures, focusing on identifying and preventing risks, and the traditional protection is through encryption and verification, and in the event of an intrusion, They are all directly reported to the police and let people handle it, which will cause a waste of human resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic security protection method and system for industrial Internet
  • Dynamic security protection method and system for industrial Internet
  • Dynamic security protection method and system for industrial Internet

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0030] figure 1 A schematic structural diagram of an electronic device provided in the embodiment of this application, which can be passed in this application figure 1 The schematic diagram shown is used to describe an electronic device 100 for implementing an example of the dynamic security protection method and system for the industrial Internet according to the embodiment of the present application.

[0031] Such as figure 1 Shown is a schematic structural diagram of an electronic device, the electronic device 100 includes one or more processors 102, one or more storage devices 104, and an input device 106, and these components are connected through a bus system and / or other forms (not shown shown) interconnection. It should be noted that figure 1 The components and structure of the electronic device 100 shown are only exemplary, not limiting, and the electronic device may have figure 1 Some components shown may also have figure 1 Other components and structures not sh...

no. 2 example

[0036] refer to figure 2 A flow chart of a dynamic security protection method for the industrial Internet is shown, the method specifically includes the following steps:

[0037] Step S201, dynamically monitor intrusion requests in real time.

[0038] Wherein, the intrusion event includes all access requests that the server cannot identify, that is, illegal access.

[0039] As an implementation manner, it may be dynamic real-time monitoring of intrusion requests accessed through an interactive interface. Or dynamic real-time monitoring of intrusion requests that use the external network to intrude.

[0040] Step S202, determining whether a solution for protecting the intrusion request is stored.

[0041] Wherein, multiple solutions to deal with multiple types of intrusion requests are pre-stored in the server, and the solution is one of the multiple solutions; that is to say, the server will pre-store the Types of intrusions that have occurred, and at least one solution f...

no. 3 example

[0065] see image 3 A dynamic security protection system for the industrial Internet is shown, the system 500 includes:

[0066] A monitoring module 510, configured to dynamically monitor intrusion requests in real time, and the intrusion events include all access requests that cannot be identified by the server;

[0067] The processing module 520 is configured to determine whether a solution for protecting the intrusion request is stored, the server pre-stores multiple solutions for dealing with multiple types of the intrusion request, and the solution is the multiple solutions one of the;

[0068] A generating module 530, configured to, if not, generate interference information, where the interference information includes an empty IP address;

[0069] An alarm module 540, configured to send the interference information to the intrusion information, and send alarm information.

[0070] It should be noted that, for the specific implementation manner of the system 500, pleas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a dynamic security protection method and system for an industrial Internet, and belongs to the technical field of the Internet. The method comprises the following steps: dynamically monitoring an intrusion request in real time, wherein an intrusion event comprises all access requests which cannot be identified by a server; determining whether a solution forprotecting the intrusion request is stored or not, wherein a plurality of solutions for coping with multiple types of intrusion requests are pre-stored in the server, and the solution is one of the plurality of solutions; if not, generating a piece of interference information, wherein the interference information comprises an empty IP address; and sending the interference information to the intrusion information, and sending alarm information. According to the method, the probability of being intruded can be effectively reduced, and human resources can be saved at the same time.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular, to a dynamic security protection method and system for the industrial Internet. Background technique [0002] The current industrial Internet security architecture system is the guarantee for building a safe and trusted environment for the development of industrial intelligence. Compared with traditional industrial control system security and Internet security, the security of the industrial Internet is more challenging. On the one hand, while the Industrial Internet realizes the circulation and aggregation of data at different levels, it also breaks the relatively clear responsibility boundaries in the past. Once a security problem occurs, its scope, complexity, and risk will have a greater impact. The security of the Industrial Internet platform and data security , Internet-connected smart device security and other issues are becoming more and more prominent. On t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/145
Inventor 唐琪林阳博
Owner 唐琪林
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products