A distributed deployment method of intrusion detection function based on blockchain
An intrusion detection and distributed technology, applied in digital transmission systems, security communication devices, electrical components, etc., can solve the problem of difficult deployment of intrusion detection functions, and achieve the effect of solving trust problems and reducing load.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In the Internet of Things, complex intrusion detection algorithms are often deployed on key nodes such as gateways with sufficient resources. However, due to the openness of the Internet of Things environment and the limited resources of the underlying devices, for the underlying common Devices, etc., it is difficult to deploy complex and effective intrusion detection algorithms to detect intrusions immediately. Aiming at the problem that the underlying device resources in the Internet of Things are limited and complex intrusion detection functions cannot be realized, the present invention designs a distributed deployment method for intrusion detection functions, which divides a complex intrusion detection function into several sub-functions and deploys them separately To the detection node, thereby reducing the load required by each detection node to perform the intrusion detection function, the blockchain is used for trust management between nodes in the whole process....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


