Illegal attack monitoring method for Internet of Things platform
An Internet of Things platform and platform technology, applied in the field of Internet of Things, can solve the problems of low system security, long time difference between monitoring danger and controlling danger, and high manual dependence of monitoring, so as to achieve low manual dependence and improve safety Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0047] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0048] figure 1 It is a flow chart of a method for monitoring an abnormal operation state of an Internet of Things platform provided by an embodiment of the present invention. see figure 1 , the method includes the following steps S101-S104:
[0049] S101: Calculate the virus attack degree value of each terminal in the target IoT platform according to the uplink and downlink data traffic, data calculation amount and network speed of each terminal in the target IoT platform.
[0050] In an optional embodiment, befo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


