Unlock instant, AI-driven research and patent intelligence for your innovation.

A distributed deployment method of intrusion detection function based on blockchain

An intrusion detection and distributed technology, applied in digital transmission systems, security communication devices, electrical components, etc., can solve the problem of difficult deployment of intrusion detection functions, and achieve the effect of solving trust problems and reducing load.

Active Publication Date: 2022-04-19
YANGTZE DELTA REGION INST (QUZHOU) UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the limitations of most IoT devices in terms of storage and computing resources, it is difficult to fully deploy some complex but effective intrusion detection functions on each detection node
Secondly, due to the openness and easy access of the network environment of the Internet of Things, mutual trust between nodes is facing great challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed deployment method of intrusion detection function based on blockchain
  • A distributed deployment method of intrusion detection function based on blockchain
  • A distributed deployment method of intrusion detection function based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the Internet of Things, complex intrusion detection algorithms are often deployed on key nodes such as gateways with sufficient resources. However, due to the openness of the Internet of Things environment and the limited resources of the underlying devices, for the underlying common Devices, etc., it is difficult to deploy complex and effective intrusion detection algorithms to detect intrusions immediately. Aiming at the problem that the underlying device resources in the Internet of Things are limited and complex intrusion detection functions cannot be realized, the present invention designs a distributed deployment method for intrusion detection functions, which divides a complex intrusion detection function into several sub-functions and deploys them separately To the detection node, thereby reducing the load required by each detection node to perform the intrusion detection function, the blockchain is used for trust management between nodes in the whole process....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based distributed deployment method for intrusion detection functions, comprising the following steps: S1, selection of detection nodes; S2, distributed deployment and execution of intrusion detection functions: splitting the complete intrusion detection function into several An independent detection sub-function, and according to the distribution of detection nodes in a cluster, calculate the optimal detection data transmission path, and then deploy the sub-function on the detection nodes; S3, verify the detection node execution status, if found Malicious behaviors are packaged into blocks and broadcast. The present invention divides the complete detection function into different sub-functions and deploys them on different detection nodes, and the detection nodes cooperate to complete the detection function through the optimal data transmission path, which greatly reduces the complexity of intrusion detection for each detection node. algorithm load.

Description

technical field [0001] The present invention belongs to the security field of the Internet of Things. Specifically aiming at the limitation of computing and storage resources of Internet of Things devices, a distributed deployment method of intrusion detection function is designed, and the complete intrusion detection function is distributed and deployed on multiple detection nodes. In this way, the burden on a single detection node is reduced, and the trust management function between detection nodes is realized through blockchain technology. Background technique [0002] The Internet of Things can connect a large number of digital and physical objects (such as wireless sensor networks, smart meters, smartphones and smart appliances, etc.), while providing open access to various data generated by these devices, enabling new services for citizens and companies, but Due to the heterogeneity of devices and protocols used, data privacy and other issues, the security of the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L45/00
CPCH04L63/1425H04L45/46
Inventor 韦云凯张婷婷彭美娥冷甦鹏杨鲲刘强沈军
Owner YANGTZE DELTA REGION INST (QUZHOU) UNIV OF ELECTRONIC SCI & TECH OF CHINA