Supercharge Your Innovation With Domain-Expert AI Agents!

Sampling-based edge computing architecture Internet of Things intrusion detection system and method

An intrusion detection system and edge computing technology, applied in the field of Internet of Things security, can solve the problems of data expansion, low efficiency, and reduce the amount of calculation, and achieve the effect of improving performance, increasing stability, and saving resource consumption.

Pending Publication Date: 2022-05-13
SHAOXING UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above defects or improvement needs of the prior art, the present invention provides a sampling-based edge computing framework IoT intrusion detection system and method, the purpose of which is to use the potential timing characteristics of network traffic to sample and select network traffic data packets for intrusion Detection, obtain the overall detection results of a batch of network traffic data, reduce the amount of calculation to adapt to the edge computing architecture, thereby solving the data expansion of the existing Internet of Things intrusion detection system, resulting in relatively low efficiency of intrusion detection, which cannot be used for quartz edge computing Architecture Technical Issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sampling-based edge computing architecture Internet of Things intrusion detection system and method
  • Sampling-based edge computing architecture Internet of Things intrusion detection system and method
  • Sampling-based edge computing architecture Internet of Things intrusion detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0053] The intrusion detection system provided by the present invention is applied to the edge computing architecture Internet of Things, including a network traffic quality discriminator and a network traffic data packet selection network;

[0054] The traffic data packet selection network is used to select a network traffic data packet feature vector of a preset size according to rounds from a specific batch of network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sampling-based edge computing architecture internet of things intrusion detection system and method. The method is applied to the edge computing architecture Internet of Things, and comprises a network traffic quality discriminator used for selecting a network traffic data packet feature vector of a preset size according to a round from a network traffic training data set of a specific batch, selecting a network by a network traffic data packet, and determining the network traffic quality. And the judgment module is used for judging whether the network flow data packet selected by the flow data packet selection network is malicious or not according to the feature vector. According to the system provided by the invention, the network combination is selected through the network flow quality discriminator and the network flow data packet, so that the automatic sampling detection of the data packet is realized without the interference of external personnel, and the stability of the edge computing architecture Internet of Things intrusion detection system facing a large amount of data is improved; and the resource consumption of the edge computing architecture Internet of Things intrusion detection system can be saved, and the performance of the edge computing architecture Internet of Things intrusion detection system is improved.

Description

technical field [0001] The invention belongs to the field of Internet of Things security, and more specifically relates to a sampling-based edge computing architecture Internet of Things intrusion detection system and method. Background technique [0002] As a new type of network architecture, edge computing uses surrounding edge servers that can provide network, computing, storage, application and other capabilities to provide various services and applications nearby, effectively solving the delay problem in IoT applications and improving Improve network performance, reduce operating costs, and ensure rational use of resources. However, in today's environment where the Internet of Things is becoming more and more popular, a large number of heterogeneous Internet of Things devices bring a large amount of private data, which exist in different locations, and it is difficult to ensure integrity; in addition, unauthorized users or opponents may Modifying or misusing the upload...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G16Y30/10G06N3/08G06N3/04
CPCH04L63/1416G16Y30/10G06N3/08G06N3/047
Inventor 沈士根李振威沈亦周周海平孙攀军王建华
Owner SHAOXING UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More