CN104378354A - Internet of things security model method based on classification - Google Patents

Internet of things security model method based on classification Download PDF

Info

Publication number
CN104378354A
CN104378354A CN201410550029.7A CN201410550029A CN104378354A CN 104378354 A CN104378354 A CN 104378354A CN 201410550029 A CN201410550029 A CN 201410550029A CN 104378354 A CN104378354 A CN 104378354A
Authority
CN
China
Prior art keywords
internet
technology
layer
data
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410550029.7A
Other languages
Chinese (zh)
Inventor
傅涛
傅德胜
经正俊
孙文静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd filed Critical JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201410550029.7A priority Critical patent/CN104378354A/en
Publication of CN104378354A publication Critical patent/CN104378354A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1042Peer-to-peer [P2P] networks using topology management mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides an internet of things security model method based on classification, and relates to the technical field of internet of things security models. Three layers, namely, the perception layer, the network layer and the application layer, are included, wherein the perception layer is used for achieving the data collection function, the network layer is used for transmitting data, and the application layer is used for processing and applying the data. Active elements and passive elements are included, wherein the passive elements include a service data unit, a system hardware device and a sensitive data unit. The method includes the steps of firstly, analyzing application requirements; secondly, analyzing the network topology; thirdly, conducting attacking type prediction; fourthly, conducting security classification judgment. The method is clear in work division, the effect of the executive force can be brought into full play, the judgment on malicious instruction information can be automatically processed, the reasonable attacking target of an attacker can be effectively found, and then the probability and strength of the attack to which the type of application may be subjected are predicted.

Description

A kind of method of the Internet of Things security model based on grade classification
Technical field:
The present invention relates to Internet of Things security model technical field, be specifically related to a kind of method of the Internet of Things security model based on grade classification.
Background technology:
Internet of Things is the important component part of generation information technology, and its English name is: " TheInternet of things ".As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.This has the two-layer meaning: one, and core and the basis of Internet of Things remain the Internet, is the network of extension on Internet basic and expansion; Its two, its user side extend and extend between any article and article, carry out information exchange and communicate.Internet of Things is exactly " the Internet that thing thing is connected ".Internet of Things by Intellisense, recognition technology and general fit calculation, be widely used in the fusion of network, be also therefore called as the third wave of after computer, the Internet world information industry development.Internet of Things is the application extension of the Internet, Internet of Things is network, not equal to Internet of Things is business and application.Therefore, application innovation is the core of Internet of Things development, is that the innovation 2.0 of core is the soul that Internet of Things develops with Consumer's Experience.
Point definition alive: utilize the communication technology such as localized network or the Internet that transducer, controller, machine, personnel and thing etc. are linked togather by new mode, forms people and thing, thing and thing are connected, and realizes informationization, remote management and control and intelligentized network.Internet of Things is the extension of the Internet, and it comprises resources all on the Internet and the Internet, the application that compatible the Internet is all, but element all in Internet of Things (all equipment, resource and communication etc.) is all personalized and privatization.
Internet of Things is defined as the combination of nearly all technology and computer, Internet technology instantly by Internet of Things school-run enterprise alliance of China, realizes between object and object: environment and the real-time Real-Time Sharing of state information and intelligentized collection, transmission, process, execution.Inventionbroadly, instantly relate to the application of information technology, the category of Internet of Things can be included in.
Internet of Things refers to by various information sensing equipment, and any information needing the various needs such as monitoring, connection, interactive object or process of Real-time Collection, is combined the huge network formed with the Internet.Its objective is and realize thing and thing, thing and people, all article and the connection of network, convenient identification, management and control.Its at the industry size of 2011 more than 2,600 hundred million yuans.Supporting layer, sensing layer, transport layer, the podium level of construct Networking industries five levels, and application layer accounts for 2.7%, 22.0%, 33.1%, 37.5% and 4.7% of Internet of Things industry size respectively.And thing network sensing layer, transport layer participation manufacturer is numerous, becomes in industry and compete field the fiercest.
Summary of the invention:
The object of this invention is to provide a kind of method of the Internet of Things security model based on grade classification, its division of labor is clear and definite, the effect of implementation capacity can be given full play to, it can be applicable to each large Internet of Things, it can automatic business processing to the judgement of malicious instructions information, effectively can find the reasonable target of attack of assailant, and then predict the probability that this type of application may be attacked and intensity, coefficient of safety is high.
In order to solve the problem existing for background technology, the present invention is by the following technical solutions: it is made up of 3 levels: the sensing layer 1, being used for carrying out data acquisition function; 2, the network layer of transfer of data is used for carrying out; 3, data to be processed and the application layer applied; It is divided into active active element and passive element; Active active element comprises keeper and user, and passive element comprises service data unit, system hardware equipment, sensitive data unit; During operation, first application demand is analyzed, then network topology is analyzed, carry out attack type prediction, finally carry out safe class judgement.
Present invention incorporates sensing technology, the communication technology, wireless technology, these technology of network technology, grade classification is carried out to data, it is a kind of RFID technology, based on simple R FID system, in conjunction with existing network technology, database technology, middleware Technology etc., construct one to be made up of the label of the reader of networking in a large number and countless movement, the Internet of Things more huger than Internet becomes the trend of RFID technique development, Internet of Things is of many uses, throughout intelligent transportation, environmental protection, government work, public safety, safety home, intelligent fire, industry monitoring, old man nurses, multiple field such as personal health.
The present invention has following beneficial effect: its division of labor is clear and definite, the effect of implementation capacity can be given full play to, it can be applicable to each large Internet of Things, it can automatic business processing to the judgement of malicious instructions information, effectively can find the reasonable target of attack of assailant, and then predict the probability that this type of application may be attacked and intensity, coefficient of safety is high.
Embodiment:
This embodiment is by the following technical solutions: it comprises and is made up of 3 levels: the sensing layer 1, being used for carrying out data acquisition function; 2, the network layer of transfer of data is used for carrying out; 3, data to be processed and the application layer applied; It is divided into active active element and passive element; Active active element comprises keeper and user, and passive element comprises service data unit, system hardware equipment, sensitive data unit; During operation, first application demand is analyzed, then network topology is analyzed, carry out attack type prediction, finally carry out safe class judgement.
This embodiment combines sensing technology, the communication technology, wireless technology, these technology of network technology, grade classification is carried out to data, it is a kind of RFID technology, based on simple R FID system, in conjunction with existing network technology, database technology, middleware Technology etc., construct one to be made up of the label of the reader of networking in a large number and countless movement, the Internet of Things more huger than Internet becomes the trend of RFID technique development, Internet of Things is of many uses, throughout intelligent transportation, environmental protection, government work, public safety, safety home, intelligent fire, industry monitoring, old man nurses, multiple field such as personal health.
This embodiment has following beneficial effect: its division of labor is clear and definite, the effect of implementation capacity can be given full play to, it can be applicable to each large Internet of Things, it can automatic business processing to the judgement of malicious instructions information, effectively can find the reasonable target of attack of assailant, and then predict the probability that this type of application may be attacked and intensity, coefficient of safety is high.

Claims (2)

1. based on a method for the Internet of Things security model of grade classification, it is characterized in that it is made up of three levels: (1), be used for carrying out the sensing layer of data acquisition function; (2) network layer of transfer of data, is used for carrying out; (3), data to be processed and the application layer applied; It is divided into active active element and passive element; Active active element comprises keeper and user, and passive element comprises service data unit, system hardware equipment, sensitive data unit; During operation, first application demand is analyzed, then network topology is analyzed, carry out attack type prediction, finally carry out safe class judgement.
2. the method for a kind of Internet of Things security model based on grade classification according to claim 1, it is characterized in that described it combines sensing technology, the communication technology, wireless technology, these technology of network technology, grade classification is carried out to data, it is a kind of RFID technology, based on simple R FID system, in conjunction with existing network technology, database technology, middleware Technology etc., construct one and to be made up of the label of the reader of networking in a large number and countless movement.
CN201410550029.7A 2014-10-16 2014-10-16 Internet of things security model method based on classification Pending CN104378354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410550029.7A CN104378354A (en) 2014-10-16 2014-10-16 Internet of things security model method based on classification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410550029.7A CN104378354A (en) 2014-10-16 2014-10-16 Internet of things security model method based on classification

Publications (1)

Publication Number Publication Date
CN104378354A true CN104378354A (en) 2015-02-25

Family

ID=52557011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410550029.7A Pending CN104378354A (en) 2014-10-16 2014-10-16 Internet of things security model method based on classification

Country Status (1)

Country Link
CN (1) CN104378354A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714346A (en) * 2015-12-15 2019-05-03 北京奇虎科技有限公司 The checking and killing method and device of backdoor file
CN110460526A (en) * 2019-06-29 2019-11-15 天津大学 A kind of communication means of the internet of things networking data acquisition distribution for content oriented
CN110865596A (en) * 2019-11-21 2020-03-06 江苏道博信息技术有限公司 Raise dust on-line monitoring and management and control system
CN113395308A (en) * 2020-03-13 2021-09-14 昆山恒禾隆智能化系统有限公司 Intelligent security system and method for Internet of things
CN114826742A (en) * 2022-04-28 2022-07-29 江苏徐工工程机械研究院有限公司 Communication safety system and authentication method for engineering machinery Internet of things sensing layer network

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714346A (en) * 2015-12-15 2019-05-03 北京奇虎科技有限公司 The checking and killing method and device of backdoor file
CN109714346B (en) * 2015-12-15 2021-06-25 北京奇虎科技有限公司 Searching and killing method and device for back door files
CN110460526A (en) * 2019-06-29 2019-11-15 天津大学 A kind of communication means of the internet of things networking data acquisition distribution for content oriented
CN110460526B (en) * 2019-06-29 2021-08-10 天津大学 Communication method for content-oriented networking data acquisition and distribution of Internet of things
CN110865596A (en) * 2019-11-21 2020-03-06 江苏道博信息技术有限公司 Raise dust on-line monitoring and management and control system
CN113395308A (en) * 2020-03-13 2021-09-14 昆山恒禾隆智能化系统有限公司 Intelligent security system and method for Internet of things
CN114826742A (en) * 2022-04-28 2022-07-29 江苏徐工工程机械研究院有限公司 Communication safety system and authentication method for engineering machinery Internet of things sensing layer network
CN114826742B (en) * 2022-04-28 2023-07-28 江苏徐工工程机械研究院有限公司 Communication security system and authentication method for engineering machinery internet of things perception layer network

Similar Documents

Publication Publication Date Title
CN104378354A (en) Internet of things security model method based on classification
Zhou et al. Industry 4.0: Towards future industrial opportunities and challenges
Tadejko Application of Internet of Things in logistics–current challenges
Jansen et al. Mitigating risks of digitalization through managed industrial security services
Lee What roles should the government play in fostering the advancement of the Internet of Things?
Poniszewska-Maranda et al. Selected methods of artificial intelligence for Internet of Things conception
CN110474903A (en) Trust data acquisition methods, device and block chain node
Xu et al. Safety assessment of petrochemical enterprise using the cloud model, PHA–LOPA and the bow-tie model
AU2021104400A4 (en) An intelligent system for detecting behavioral cyber attack on industrial iot using ai federated learning algorithm
Sarmah et al. A brief review on Internet of Things
Wang et al. Research on design of military logistics support system based on IoT
Arslan et al. The use of internet of things in the construction industry
CN103957272A (en) Method for achieving interconnection and interaction control between devices of Internet of Things
CN104007725B (en) equipment monitoring system and monitoring method thereof
CN103854230A (en) Electric power security risk management and control system and method
Lonkar et al. Smart disaster management and prevention using reinforcement learning in IoT environment
CN104065533A (en) Internet of things distributed dynamic security detection system
CN103577855A (en) Clothes washing management system used in laundry and clothes washing management method
CN104883348A (en) Network security regulation automatic deployment method and system
Dhall et al. Machine Learning Algorithms for Industry Using Image Sensing
Lin et al. Cloud‐based production logistics synchronisation service infrastructure for customised production processes
CN109741559A (en) A kind of processing method and processing device managing garden safety
Garg Smart is new green: a sustainability revolution with internet of things and fog
Anastasi et al. Evolution of European product directives in perspective of industry 4.0
Teng Industrial internet of things anti-intrusion detection system by neural network in the context of internet of things for Privacy Law Security Protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province

Applicant after: Jiangsu's software Polytron Technologies Inc

Address before: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province

Applicant before: Jiangsu Bozhi Software Technology Co., Ltd.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province

Applicant after: Jiangsu's software Polytron Technologies Inc

Address before: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province

Applicant before: Jiangsu Bozhi Software Technology Co., Ltd.

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150225