Supercharge Your Innovation With Domain-Expert AI Agents!

Intrusion detection system based on Internet of Things flow and detection method thereof

An intrusion detection system and intrusion detection technology are applied in the field of Internet of Things security to achieve the effect of improving detection rate, detection accuracy and reliability.

Inactive Publication Date: 2021-02-05
SICHUAN NORMAL UNIVERSITY
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In view of the dynamics, complexity, network and device heterogeneity of the Internet of Things, the Internet of Things has exposed more and more security issues, and most of the intrusions against the Internet of Things are infiltrated through the network. In order to apply In the new scene of the Internet of Things, new Internet of Things communication protocols continue to appear, but there is currently no intrusion detection system specifically for the data traffic of the Internet of Things protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system based on Internet of Things flow and detection method thereof
  • Intrusion detection system based on Internet of Things flow and detection method thereof
  • Intrusion detection system based on Internet of Things flow and detection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] like figure 1As shown, the intrusion detection system based on the Internet of Things traffic of the present invention includes a basic data acquisition module, an Internet of Things protocol identification module connected with the basic data acquisition module, an abnormal data flow detection module connected with the Internet of Things protocol identification module, and A visual analysis module connected with the data traffic anomaly detection module.

[0059] Specifically, the basic data acquisition module runs or is mounted in a third-party device of the Internet of Things, which is used to collect network data traffic in the Internet of Things environment, generate initial data of the data flow, and transmit the initial data to the Internet of Things protocol Identification module; that is, the basic data acquisition module can capture the data packets flowing through the network card in real time on the Internet of Things link layer, and can also export the IoT ...

Embodiment 2

[0074] This embodiment adopts the detection method of the intrusion detection system based on the Internet of Things traffic in Embodiment 1, such as Figure 5 As shown, it specifically includes the following steps:

[0075] Step 1: The basic data acquisition module acquires the initial data of the IoT data stream. like Image 6 As shown, the basic data acquisition module obtains the initial data of the Internet of Things data flow including the following steps:

[0076] A. The basic data acquisition module is connected to the router, gateway or switch through the interface module on it. When the basic data acquisition module is started, the data flow acquisition module on the basic data acquisition module will start from the link layer of the Internet of Things or run on the The IoT data traffic packets are obtained from the devices in the Internet of Things environment, and the traffic packets are stored in the data traffic cache module. When the Internet of Things data t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection system based on Internet of Things flow. The intrusion detection system comprises a basic data acquisition module, an Internet of Things protocol identification module, a data flow anomaly detection module and a visual analysis module. The invention further discloses an intrusion detection method based on the Internet of Things flow, which comprises the following steps: acquiring initial data of the Internet of Things data flow, determining a protocol type of the acquired Internet of Things data flow, carrying out anomaly detection on a deep packet of the Internet of Things data flow, and carrying out anomaly detection on a deep flow of the Internet of Things data flow; and judging whether the Internet of Things data flow is abnormal or not according to the detection result of the deep packet and the detection result of the deep flow The method goes deep into the process from flow collection to detection of the Internet of Things intrusiondetection system, improves the intrusion detection system under the Internet of Things, improves the intrusion detection efficiency, reminds safety personnel to engage in an event response plan, andprovides a powerful guarantee for the safety protection of the Internet of Things.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and specifically refers to an intrusion detection system based on Internet of Things traffic and a detection method thereof. Background technique [0002] In view of the dynamics, complexity, network and device heterogeneity of the Internet of Things, the Internet of Things has exposed more and more security issues, and most of the intrusions against the Internet of Things are infiltrated through the network. In order to apply In the new scene of the Internet of Things, new Internet of Things communication protocols continue to appear, but there is currently no intrusion detection system specifically for the data traffic of the Internet of Things protocol. In order to ensure the safe operation of IoT devices and the safe storage of data, it is urgent to study the security of data packet detection in IoT protocols. Contents of the invention [0003] The purpose of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/28H04L63/1416H04L63/168H04L63/20
Inventor 李焕洲唐彰国何丽
Owner SICHUAN NORMAL UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More