Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack mode automatic identification system based on Internet of Things

An automatic identification system and automatic identification technology, applied in the field of the Internet of Things, can solve problems such as difficult to locate hosts, difficult to identify intrusion threats, difficult to extract intruder attack characteristics, etc., to achieve convenient and fast processing, improve security performance, and ensure accurate investigation The effect of sex and traceability

Active Publication Date: 2021-02-05
STATE GRID CHONGQING ELECTRIC POWER CO ELECTRIC POWER RES INST +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] While improving the level of automation, digitalization and intelligence in the power system, it is necessary to pay more attention to the network security monitoring system. Once the power network is attacked, the consequences will be even more unimaginable. Because in the existing technology, there is a lack of IoT-based The automatic identification system of attack methods makes it difficult to identify intrusion threats, extract the attack characteristics of intruders, identify advanced persistent threats, restore attack behaviors, locate intruders, and locate attacked hosts. The protection effect is not satisfactory, so it is necessary to redesign an automatic identification system for attack methods based on the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack mode automatic identification system based on Internet of Things
  • Attack mode automatic identification system based on Internet of Things
  • Attack mode automatic identification system based on Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] see Figure 1-Figure 6 , the present invention provides a technical solution:

[0044] An attack mode automatic identification system based on the Internet of Things, including a network security monitoring system, an attack mode automatic identification module and a host, and a network security monitoring system (such as figure 1 and image 3 shown) includes a security interaction platform and logical isolation equipment at the boundary of the inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack mode automatic identification system based on the Internet of Things, which comprises a network security monitoring system, an attack mode automatic identification module and a host, and is characterized in that the network security monitoring system comprises a security interaction platform and logic isolation equipment which are arranged at the boundary of an information intranet server and an information extranet server, and IPS / IDS equipment identifies intrusion threats; a honeypot system extracts intruder attack features; an APT attack detection equipmentidentifies advanced persistent threats; attack tracing equipment restores the attack behavior and locates the intruder through the intruder information locating module; a DNS monitoring system positions an attacked host; a behavior tracking system and a behavior analysis and verification module form service access control, and the host is in signal connection with the intranet server through theattack mode automatic identification module; intrusion threats are actively recognized, intruder attack features are extracted, advanced persistent threats are recognized, attack behaviors are restored, intruders are positioned, and protection on the host and data is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an automatic identification system for attack methods based on the Internet of Things. Background technique [0002] The traditional Internet is mature and widely used, but there are still security loopholes. As an emerging product, the Internet of Things has a more complex architecture, no unified standards, and more prominent security issues in all aspects. The key implementation technology is the sensor network. In the natural environment where the sensor is exposed, especially some sensors placed in the harsh environment, how to maintain the integrity of the network for a long time puts forward new requirements for the sensor technology. The sensor network must have its own healing function. This is not only affected by environmental factors, but also by human factors. RFID is another key implementation technology, which is to put electronic tags into items ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G16Y30/10
CPCH04L63/1408H04L63/1416H04L63/1425H04L63/1433H04L63/0861G16Y30/10Y04S40/20
Inventor 韩世海景钰文朱珠梁花高爽李玮张森晏尧王凌云雷娟徐鑫张伟李洋徐镭洋张逸於舰
Owner STATE GRID CHONGQING ELECTRIC POWER CO ELECTRIC POWER RES INST