Internet of Things data security monitoring method
A technology of data security and the Internet of Things, applied in the fields of digital data protection, electrical digital data processing, computer security devices, etc., can solve the problems affecting data security, affecting data processing speed, etc. The effect of precise data filtering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] like Figure 1-3 As shown, the IoT data security monitoring method according to the embodiment of the present invention includes the following steps;
[0041] Step S101, monitoring the working state of the Internet of Things itself, and forming data related to the working state of the Internet of Things;
[0042] Step S103, obtaining monitored data objects, filtering each data object, and assigning a unique RULE_ID to each data object;
[0043] Step S105, start monitoring the data object to be monitored according to monitoring rules, so as to obtain preliminary monitoring results;
[0044] Step S107, analyzing each preliminary monitoring result, and separately generating a hash for each rule, and determining the distribution characteristics of the hash;
[0045] Step S109, filter the distribution characteristics of the hash through a bitmap algorithm and a linked list to obtain data field groups, and the preset data field groups include random groups and / or focus grou...
Embodiment 2
[0053] like Figure 1-3As shown, the data object includes at least one or more data fields, and according to the number of field values of each type of data field, determine the ratio of the field value of each field to the total number of field values, and according to the number of field values of the target field The number of types of field values and the ratio of the field values of each field to the total number of field values determine the distribution characteristics of the field values of the target field, and monitor the distribution characteristics, and design the corresponding fingerprint data algorithm according to the data of the distribution characteristics , and the number of types and the number of field values are determined as distribution characteristics of field values of the target field.
Embodiment 3
[0055] like Figure 1-3 As shown, in the Internet of Things data security monitoring method, starting to monitor the data object to be monitored according to the monitoring rules includes the following steps:
[0056] Step S201, obtaining parameters of a preset monitoring workload, where the preset workload parameters include a preset number of global traversals for the data object to be monitored;
[0057] Step S203, the validity of the data fields in the data object to be monitored and whether the data fields conform to the business logic;
[0058] Step S205, judging one or more types of business logic whether the number of global traversals currently performed on the data object to be monitored reaches a preset number of times;
[0059] Step S207, performing spot checks on the data fields of the monitored data to obtain the results of the spot checks on the data fields;
[0060] Step S209, determine whether to terminate the monitoring of the data object to be monitored ac...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


