Unlock instant, AI-driven research and patent intelligence for your innovation.

Illegal attack monitoring method for Internet of Things platform

An Internet of Things platform and platform technology, applied in the field of Internet of Things, can solve the problems of low system security, long time difference between monitoring danger and controlling danger, and high manual dependence of monitoring, so as to achieve low manual dependence and improve safety Effect

Active Publication Date: 2021-10-15
慧之安信息技术股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a method for monitoring illegal attacks on the Internet of Things platform, which is used to solve the problem that there is currently no particularly effective monitoring solution for illegal attacks on the Internet of Things platform (especially virus attacks), and the monitoring is highly dependent on manual labor, and the monitoring is dangerous. Control the problem that the dangerous time difference is long and the system security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal attack monitoring method for Internet of Things platform
  • Illegal attack monitoring method for Internet of Things platform
  • Illegal attack monitoring method for Internet of Things platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0047] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0048] figure 1 It is a flow chart of a method for monitoring an abnormal operation state of an Internet of Things platform provided by an embodiment of the present invention. see figure 1 , the method includes the following steps S101-S104:

[0049] S101: Calculate the virus attack degree value of each terminal in the target IoT platform according to the uplink and downlink data traffic, data calculation amount and network speed of each terminal in the target IoT platform.

[0050] In an optional embodiment, befo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal attack monitoring method for an Internet of Things platform, which is used for solving the problems of high manual dependence, long time difference from danger monitoring to danger control and low system security in the prior art. The method comprises the following steps: calculating a virus attack degree value of each terminal in a target Internet of Things platform according to uplink and downlink data traffic, a data calculation amount and a network speed of each terminal in the target Internet of Things platform; according to the virus attack degree value of each terminal, calculating a range proportion value of the target Internet of Things platform attacked by the virus; and calculating a power-on enabling control value of each terminal in the target Internet of Things platform according to the virus attack degree value of each terminal in the target Internet of Things platform and the virus attack range proportion value of the target Internet of Things platform, and controlling power-on / power-off of each terminal according to the power-on enabling control value and a control strategy. According to the method provided by the invention, illegal attacks on the Internet of Things platform are monitored in time, and the security is high.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method for monitoring illegal attacks on an Internet of Things platform. Background technique [0002] With the development of information technology and the Internet, the Internet of Things (IOT) has emerged as the times require. It is an extended and expanded network based on the Internet. Through various information sensors, radio frequency identification technology, global positioning system, infrared sensor Various devices and technologies such as scanners and laser scanners can collect any object or process that needs to be monitored, connected, and interacted in real time, and collect various required information such as sound, light, heat, electricity, mechanics, chemistry, biology, and location. Through all kinds of possible network access, the interconnection of people, machines and things can be realized at any time and any place. [0003] As an impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/825
CPCH04L63/145H04L47/266Y02D30/70
Inventor 余丹兰雨晴王丹星
Owner 慧之安信息技术股份有限公司