Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of Things network security risk evaluation method and device, and computer storage medium

A network security and security risk technology, applied in the assessment of Internet of Things network security risks and the field of computer storage media, can solve the problem of inability to pre-assess potential risks

Active Publication Date: 2021-04-23
HARBIN INSTITUTE OF TECHNOLOGY SHENZHEN (INSTITUTE OF SCIENCE AND TECHNOLOGY INNOVATION HARBIN INSTITUTE OF TECHNOLOGY SHENZHEN) +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional technical means focus on finding security threats and vulnerabilities through the external abnormal performance of IoT devices with the help of security detection equipment, for example, detecting whether the external network traffic of IoT devices is abnormal to determine whether there is a security risk, but this method cannot Pre-evaluate potential risks when IoT devices do not behave abnormally, so as to take preventive measures as early as possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things network security risk evaluation method and device, and computer storage medium
  • Internet of Things network security risk evaluation method and device, and computer storage medium
  • Internet of Things network security risk evaluation method and device, and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050]The embodiment of the present invention provides a solution, which calculates the security risks faced by IoT devices in terms of hardware architecture, operating system, application services, and communication methods through knowledge graph subgraphs containing vulnerable nodes, and comprehensively evaluates IoT devices based on security risks and security mechanisms. The overall security risk of the Internet of Things realizes the pre-security assessment when the IoT devices do not exhibit abnormal behavior.

[0051] Such as figure 1 as shown, figure 1 It is a schematic diagram of the terminal structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0052] The terminal in this embodiment of the present invention is a terminal device such as a PC ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things network security risk evaluation method and device and a computer storage medium. The method comprises the steps of obtaining device information of each Internet of Things device in a to-be-assessed Internet of Things; obtaining a sub-graph of each Internet of Things device according to a pre-stored knowledge graph; obtaining feature vector centrality scores of nodes where the hardware architecture, the operating system, the application service and the communication mode are located according to the sub-graphs; determining a security risk score of the Internet of Things device according to the feature vector centrality score and the number of security mechanisms used by the Internet of Things device; and obtaining an assessment score of the to-be-assessed Internet of Things according to the security risk score. According to the invention, the security risk faced by the Internet of Things equipment in hardware architecture, operating system, application service and communication mode is calculated through the knowledge graph subgraph containing the vulnerability nodes, and the overall security risk of the Internet of Things is comprehensively evaluated according to the security risk and a security mechanism, so that the pre-security evaluation is realized when the abnormal performance of the Internet of Things equipment does not occur.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method, a device and a computer storage medium for assessing network security risks of the Internet of Things. Background technique [0002] With the rapid development of smart grid, smart home, smart medical care, smart transportation and other fields, the market demand for IoT devices continues to grow. Since the Internet of Things includes the content of the perception layer, and most Internet of Things devices have limited hardware resources, it is difficult to implement strict and comprehensive security protection methods in traditional Internet security. important. [0003] Traditional technical means focus on finding security threats and vulnerabilities through the external abnormal performance of IoT devices with the help of security detection equipment, for example, detecting whether the external network traffic of IoT devices is abnormal to determine w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06Q10/06G06F16/28G16Y30/10G16Y40/50
CPCG06F21/577G06F2221/034G06Q10/0635G06F16/288G16Y30/10G16Y40/50
Inventor 张伟哲冯禹铭方滨兴张宾
Owner HARBIN INSTITUTE OF TECHNOLOGY SHENZHEN (INSTITUTE OF SCIENCE AND TECHNOLOGY INNOVATION HARBIN INSTITUTE OF TECHNOLOGY SHENZHEN)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More