CN104378354A - Internet of things security model method based on classification - Google Patents
Internet of things security model method based on classification Download PDFInfo
- Publication number
- CN104378354A CN104378354A CN201410550029.7A CN201410550029A CN104378354A CN 104378354 A CN104378354 A CN 104378354A CN 201410550029 A CN201410550029 A CN 201410550029A CN 104378354 A CN104378354 A CN 104378354A
- Authority
- CN
- China
- Prior art keywords
- internet
- technology
- layer
- data
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1042—Peer-to-peer [P2P] networks using topology management mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550029.7A CN104378354A (en) | 2014-10-16 | 2014-10-16 | Internet of things security model method based on classification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550029.7A CN104378354A (en) | 2014-10-16 | 2014-10-16 | Internet of things security model method based on classification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104378354A true CN104378354A (en) | 2015-02-25 |
Family
ID=52557011
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410550029.7A Pending CN104378354A (en) | 2014-10-16 | 2014-10-16 | Internet of things security model method based on classification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104378354A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714346A (en) * | 2015-12-15 | 2019-05-03 | 北京奇虎科技有限公司 | The checking and killing method and device of backdoor file |
CN110460526A (en) * | 2019-06-29 | 2019-11-15 | 天津大学 | A kind of communication means of the internet of things networking data acquisition distribution for content oriented |
CN110865596A (en) * | 2019-11-21 | 2020-03-06 | 江苏道博信息技术有限公司 | Raise dust on-line monitoring and management and control system |
CN113395308A (en) * | 2020-03-13 | 2021-09-14 | 昆山恒禾隆智能化系统有限公司 | Intelligent security system and method for Internet of things |
CN114826742A (en) * | 2022-04-28 | 2022-07-29 | 江苏徐工工程机械研究院有限公司 | Communication safety system and authentication method for engineering machinery Internet of things sensing layer network |
-
2014
- 2014-10-16 CN CN201410550029.7A patent/CN104378354A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714346A (en) * | 2015-12-15 | 2019-05-03 | 北京奇虎科技有限公司 | The checking and killing method and device of backdoor file |
CN109714346B (en) * | 2015-12-15 | 2021-06-25 | 北京奇虎科技有限公司 | Searching and killing method and device for back door files |
CN110460526A (en) * | 2019-06-29 | 2019-11-15 | 天津大学 | A kind of communication means of the internet of things networking data acquisition distribution for content oriented |
CN110460526B (en) * | 2019-06-29 | 2021-08-10 | 天津大学 | Communication method for content-oriented networking data acquisition and distribution of Internet of things |
CN110865596A (en) * | 2019-11-21 | 2020-03-06 | 江苏道博信息技术有限公司 | Raise dust on-line monitoring and management and control system |
CN113395308A (en) * | 2020-03-13 | 2021-09-14 | 昆山恒禾隆智能化系统有限公司 | Intelligent security system and method for Internet of things |
CN114826742A (en) * | 2022-04-28 | 2022-07-29 | 江苏徐工工程机械研究院有限公司 | Communication safety system and authentication method for engineering machinery Internet of things sensing layer network |
CN114826742B (en) * | 2022-04-28 | 2023-07-28 | 江苏徐工工程机械研究院有限公司 | Communication security system and authentication method for engineering machinery internet of things perception layer network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104378354A (en) | Internet of things security model method based on classification | |
Zhou et al. | Industry 4.0: Towards future industrial opportunities and challenges | |
Tadejko | Application of Internet of Things in logistics–current challenges | |
Jansen et al. | Mitigating risks of digitalization through managed industrial security services | |
Lee | What roles should the government play in fostering the advancement of the Internet of Things? | |
Poniszewska-Maranda et al. | Selected methods of artificial intelligence for Internet of Things conception | |
CN110474903A (en) | Trust data acquisition methods, device and block chain node | |
Xu et al. | Safety assessment of petrochemical enterprise using the cloud model, PHA–LOPA and the bow-tie model | |
AU2021104400A4 (en) | An intelligent system for detecting behavioral cyber attack on industrial iot using ai federated learning algorithm | |
Sarmah et al. | A brief review on Internet of Things | |
Wang et al. | Research on design of military logistics support system based on IoT | |
Arslan et al. | The use of internet of things in the construction industry | |
CN103957272A (en) | Method for achieving interconnection and interaction control between devices of Internet of Things | |
CN104007725B (en) | equipment monitoring system and monitoring method thereof | |
CN103854230A (en) | Electric power security risk management and control system and method | |
Lonkar et al. | Smart disaster management and prevention using reinforcement learning in IoT environment | |
CN104065533A (en) | Internet of things distributed dynamic security detection system | |
CN103577855A (en) | Clothes washing management system used in laundry and clothes washing management method | |
CN104883348A (en) | Network security regulation automatic deployment method and system | |
Dhall et al. | Machine Learning Algorithms for Industry Using Image Sensing | |
Lin et al. | Cloud‐based production logistics synchronisation service infrastructure for customised production processes | |
CN109741559A (en) | A kind of processing method and processing device managing garden safety | |
Garg | Smart is new green: a sustainability revolution with internet of things and fog | |
Anastasi et al. | Evolution of European product directives in perspective of industry 4.0 | |
Teng | Industrial internet of things anti-intrusion detection system by neural network in the context of internet of things for Privacy Law Security Protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province Applicant after: Jiangsu's software Polytron Technologies Inc Address before: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province Applicant before: Jiangsu Bozhi Software Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province Applicant after: Jiangsu's software Polytron Technologies Inc Address before: Room 808, Chuangzhi Software Park, No. 1 Xichun Road, Yuhuatai District, Nanjing City, Jiangsu Province Applicant before: Jiangsu Bozhi Software Technology Co., Ltd. |
|
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150225 |