Penetration attack detection method for intelligent Internet of Things terminal container

A technology of attack detection and intelligent IoT, which is applied in the fields of instrumentation, computing, and electrical digital data processing, etc., can solve problems such as container isolation not working, container system security issues, impacts, etc., and achieve the effect of easy discovery and repair

Pending Publication Date: 2022-05-27
NORTH CHINA ELECTRIC POWER UNIV (BAODING) +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although containers are very lightweight and convenient, there are also some security issues in the container system. Penetration attacks on smart IoT terminal containers may cause container escape problems, and attackers can even use penetration attacks to elevate their permissions
Container escape means that the process in the container affects other containers or the host, and the isolation of the container does not play a role

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration attack detection method for intelligent Internet of Things terminal container
  • Penetration attack detection method for intelligent Internet of Things terminal container
  • Penetration attack detection method for intelligent Internet of Things terminal container

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to better understand the present invention, the content of the present invention is further illustrated below in conjunction with the examples, but the content of the present invention is not limited to the following examples.

[0047] like figure 1 As shown in the figure, a penetration attack detection method for a container of an intelligent IoT terminal includes the following steps: 1) conducting penetration attacks on the container through security loopholes to detect whether the container escapes; 2) causing the container to escape through wrong configuration, and then Penetration attack detection.

[0048] The penetration attack detection method of the above-mentioned intelligent IoT terminal container needs to determine whether the current environment is in the Docker environment, and only in the Docker environment can the penetration attack test on the container be carried out. There are two commonly used judgment methods. One is to check whether / .doc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a penetration attack detection method for an intelligent Internet of Things terminal container, which comprises the following steps of: 1) performing penetration attack on the container through security vulnerabilities, and detecting whether the container escapes or not; and 2) triggering escape of the container through wrong configuration, and performing penetration attack detection on the container. Through the penetration attack detection of the intelligent Internet of Things terminal container, the security problem of the container can be found in time, and the loss of a company caused by container escape due to wrong configuration and security vulnerabilities in the future is avoided; meanwhile, a safe use container manual can be made, wrong configuration of container escape caused by penetration attack is written, and the situation that the container escape is caused by wrong configuration in the container use process of a user is avoided; permeation attack detection is carried out on the container for many times, security problems caused by vulnerabilities are found in time, security threats faced by the container are analyzed, the container is prevented from external attacks, and safe and stable operation of a server is guaranteed.

Description

technical field [0001] The invention relates to a penetration attack detection method of an intelligent IoT terminal container, belonging to the technical field of intelligent IoT terminal container security. Background technique [0002] With the rapid development of information technology, the network has become an important way of information dissemination. The scale of computer networks is becoming larger and larger, and it is more and more difficult to deploy an application. The emergence of containers (Docker) solves this problem very well. In the era when there was no virtualization technology in the past, deploying an application required preparing a physical server, installing an operating system on it, and then installing the application on the operating system. This method is very slow to deploy and the cost is very high. It is easy to waste resources, and it is not easy to migrate and expand. The emergence of virtual machines has alleviated this problem to a cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/53G06F21/57G06F9/455
CPCG06F21/53G06F21/577G06F9/45558G06F2009/45562G06F2009/45587
Inventor 李为谷肖帆高雪郭志民袁泽坤杨丹徐鑫崔文超吕卓张伟剑狄立陈岑李暖暖杨文张铮蔡军飞李鸣岩常昊张伟袁涛
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products