CN111683157B - Network security protection method for Internet of things equipment - Google Patents

Network security protection method for Internet of things equipment Download PDF

Info

Publication number
CN111683157B
CN111683157B CN202010802202.3A CN202010802202A CN111683157B CN 111683157 B CN111683157 B CN 111683157B CN 202010802202 A CN202010802202 A CN 202010802202A CN 111683157 B CN111683157 B CN 111683157B
Authority
CN
China
Prior art keywords
information
network
user
signal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010802202.3A
Other languages
Chinese (zh)
Other versions
CN111683157A (en
Inventor
汤真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Youyun Technology Co ltd
Original Assignee
Hangzhou Youyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Youyun Technology Co ltd filed Critical Hangzhou Youyun Technology Co ltd
Priority to CN202010802202.3A priority Critical patent/CN111683157B/en
Publication of CN111683157A publication Critical patent/CN111683157A/en
Application granted granted Critical
Publication of CN111683157B publication Critical patent/CN111683157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a network security protection method of Internet of things equipment, which comprises the steps that after a user logs in, a registration login module sends user information to an identity verification module, the login information of the user is verified through the identity verification module, webpage information is collected through a data collection module, website information is collected through the data collection module, analysis processing is carried out through an analysis processing module, corresponding signals are processed through a signal processing module, generated processing signals are sent to a server, network maintenance signals are received through a network maintenance module, and a network is maintained; carrying out safety maintenance measures on the server through a safety protection module, recording the safety maintenance measures and sending the safety maintenance measures to a database for storage; the system has strong safety performance, and meanwhile, the server is also maintained in a daily safety mode, so that the network intrusion probability is smaller.

Description

Network security protection method for Internet of things equipment
Technical Field
The invention relates to the technical field of safety protection of Internet of things equipment, in particular to a network safety protection method of the Internet of things equipment.
Background
The thing networking is the important component of new generation information technology, also is the important development stage of "information-based" era, and as the name implies, the thing networking is exactly the internet that the thing links to each other, and thing networking equipment has: the system mainly comprises a physical security analysis technology, a network structure security analysis technology, a system security analysis technology, a management security analysis technology and other security service and security mechanism strategies.
With the rapid development of networks, network security becomes the key point of network construction, people sometimes forget the root of security, and as a result, many unnecessary troubles are brought, and limited security protection cannot be relieved under the large environment of the information era at present.
Disclosure of Invention
The invention aims to provide a network safety protection method of Internet of things equipment, which is characterized in that information protection is carried out from two aspects of a network and a user, information of a webpage and information of a website are collected through a data collection module and are marked as the webpage information and the website information, and after the data collection module collects the safety coefficient of the webpage information and the reliability coefficient of the website information, the safety coefficient of the webpage information and the reliability coefficient of the website information are transmitted to an analysis processing module, so that the use safety performance of the user is improved; the login information of the user is verified through the identity verification module, the verification rate of the user identity is obtained through a formula, the verification rate of the user identity is transmitted to the analysis processing module after the verification rate of the user identity is obtained through the identity verification module, the identity of the login user is verified through the identity verification module, and other people are prevented from logging in, so that the privacy information is stolen, and the safety performance of the system is improved; the network maintenance module receives the network maintenance signal and maintains the network, after the bug is repaired, a corresponding firewall is added, when the network is invaded, the system immediately makes a response, the harm degree caused by the invasion of the network is reduced, and the safety of the network is enhanced; carry out the safety maintenance measure to the server through the safety protection module, carry out the record with the safety maintenance measure and send to the database and keep, the safety maintenance measure includes: (1) network layout is reasonably designed, and an internal network is separated from a public network, so that data leakage is prevented; (2) hot standby deployment is carried out, and continuous and stable operation of the server is guaranteed; (3) installing antivirus software and a tamper-proof program on a server and closing a port which can bring threat on the server; (4) the method has the advantages that the virus library is updated regularly, data management is enhanced, account password management is enhanced, complexity verification is carried out on account passwords, safety maintenance measures are carried out on the server daily, the safety of the server is enhanced, the probability of being invaded is reduced, and network information and user information are protected more strongly.
The purpose of the invention can be realized by the following technical scheme:
a network security protection method of Internet of things equipment specifically comprises the following steps;
the method comprises the following steps: a user submits user information and an account password in a registration login module, registration is carried out according to the user information and the account password, the user information and the account password which are successfully registered are sent to a database to be stored, and after the user logs in, the registration login module sends the user information to an identity verification module;
step two: verifying login information of a user through an identity verification module, wherein the login information of the user comprises the speed, time and error rate of password input by the user, and if the verification rate Am of the user identity is within a set threshold range, judging that the user identity is in accordance by a system, generating a verification success signal, and transmitting the verification rate of the user identity to an analysis processing module;
step three: acquiring information of a webpage through a data acquisition module, marking the information as webpage information, wherein the webpage information comprises the reporting times, closing times and clicking times of the webpage information, and transmitting the safety coefficient of the webpage information to an analysis processing module after the data acquisition module acquires the safety coefficient of the webpage information;
step four: the method comprises the steps that website information is collected through a data collection module and marked as website information, the website information comprises website monitoring times, available times, unavailable times and the percentage of the unavailable times, and after the data collection module collects the reliability coefficient of the website information, the reliability coefficient of the website information is transmitted to an analysis processing module;
step five: the verification rate of the user identity, the safety factor of the webpage information and the reliability coefficient of the website information are analyzed and processed through an analysis processing module, and the specific analysis processing steps are as follows:
w1: when the verification rate of the user identity is larger than or smaller than the preset value range, the analysis processing module generates an alarm signal and sends the alarm signal to the signal processing module;
w2: when the verification rate of the user identity is within the range of preset values:
if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both smaller than a preset value K, L, generating an unauthorized access signal;
if the safety coefficient Rx of the webpage information is larger than a preset value K and the reliability coefficient Mc of the website information is smaller than a preset value L, generating a low-level authority access signal;
if the safety coefficient Rx of the webpage information is smaller than a preset value K and the reliability coefficient Mc of the website information is larger than a preset value L, generating a medium-level authority access signal;
if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both greater than a preset value K, L, generating an advanced permission access signal;
step six: the method comprises the following steps of receiving an alarm signal, an unauthorized access signal, a low-level authority access signal, a middle-level authority access signal and a high-level authority access signal through a signal processing module, processing the corresponding signals and sending the generated processing signals to a server, wherein the specific processing steps are as follows:
p1: when the signal processing module receives the alarm signal, the system judges that the identity authentication is wrong, generates a delayed re-login signal and sends the delayed re-login signal to the server;
p2: when the signal processing module receives the no-authority access signal, the low-level authority access signal and the medium-level authority access signal, the system judges that the network is invaded, generates a network maintenance signal and sends the network maintenance signal to the network maintenance module;
p3: when the signal processing module receives the advanced authority access signal, the system judges that the network is not abnormal, generates a kernel communication signal and sends the kernel communication signal to the server;
step seven: receiving a network maintenance signal through a network maintenance module and maintaining a network;
step eight: and carrying out safety maintenance measures on the server through the safety protection module, recording the safety maintenance measures and sending the safety maintenance measures to the database for storage.
Further, the user information includes a name of the user, a mobile phone number for authenticating the real name of the user, and a photo.
Further, the specific verification step of the second step is as follows:
q1: acquiring the speed of inputting the password by the user, and marking the speed when the user inputs the password as Vm;
q2: acquiring the time when the user inputs the password, and marking the time when the user inputs the password as Tm;
q3: acquiring the error rate of the password input by the user, and marking the error rate when the user inputs the password as Cm;
q4: by the formula
Figure 713619DEST_PATH_IMAGE001
Obtaining a verification rate Am of the user identity, wherein d1, d2 and d3 are preset proportionality coefficients, d1 > d2 > d3 and d1+ d2+ d3=1,
Figure 489814DEST_PATH_IMAGE002
is an error correction factor, and
Figure 207235DEST_PATH_IMAGE002
=5.698423;
q5: and if the verification rate Am of the user identity is larger than or smaller than the set threshold range, the system judges that the user identity is not qualified, generates a verification failure signal and transmits the verification failure signal to the login module.
Further, the specific collection steps of the third step are as follows:
s1: acquiring the reporting times of the webpage information, and marking the reporting times of the webpage information as Qx;
s2: acquiring the closing times of the webpage information, and marking the closing times of the webpage information as Wx;
s3: acquiring the click times of the webpage information, and marking the click times of the webpage information as Ex;
s4: by the formula
Figure 290859DEST_PATH_IMAGE003
And acquiring a safety factor Rx of the webpage information, wherein d4, d5 and d6 are preset proportionality coefficients, d4 > d5 > d6 and d4+ d5+ d6= 1.
Further, the specific collection steps of the fourth step are as follows:
SS 1: acquiring the number of website monitoring times of website information, and marking the number of website monitoring times as Yc;
SS 2: acquiring the available times of site monitoring of website information, and marking the available times of site monitoring as Uc;
SS 3: acquiring the unavailable times of site monitoring of website information, and marking the unavailable times of site monitoring as Ic;
SS 4: acquiring the percentage of the unavailable times of site monitoring of the website information, and marking the percentage of the unavailable times of site monitoring as Pc;
SS 5: by the formula
Figure 308494DEST_PATH_IMAGE004
Obtaining a reliability coefficient Mc of the website information, wherein u, v, w and x are correction factors, and the u, v, w and x are in one-to-one correspondence with the website monitoring times, the available times, the unavailable times and the unavailable times of the website information in percentage,
Figure 317907DEST_PATH_IMAGE005
in order to preset the scale factor, the method comprises the following steps,
Figure 788203DEST_PATH_IMAGE005
=2.3685964。
further, the specific maintenance steps of the seventh step are as follows:
t1: the modified webpage is immediately restored through backup;
t2: under Windows system, the present network connection condition of the system is checked through network monitoring software, if the abnormal network connection is found, the connection with the system is immediately disconnected, and then the tampered network is checked by checking the system process, the service and analyzing the log files of the system and the service so as to perform corresponding recovery;
t3: the method comprises the steps of checking a vulnerability utilized by an intrusion system by analyzing a system log file, and searching a corresponding vulnerability patch of an application program for patching;
t4: and after the bugs are repaired, adding corresponding firewalls.
Further, the safety maintenance measures of the step eight specifically include: reasonably designing network layout, hot standby deployment, reinforcing server management, regularly upgrading virus libraries and reinforcing data management, wherein the reasonably designing network layout represents that an internal network is separated from a public network, and data leakage is prevented; the hot standby deployment represents that the network equipment carries out hot standby deployment to ensure the continuous and stable operation of the server; the reinforcing server management means installing antivirus software and a tamper-proof program on the server and closing a port which may bring threat on the server; the data management is enhanced by encrypting the transmission and storage of sensitive data, enhancing the management of account number and password and carrying out complexity verification on the account number and the password.
Compared with the prior art, the invention has the beneficial effects that:
1. the login information of the user is verified through the identity verification module, the login information of the user comprises the speed, the time and the error rate of inputting a password by the user, the speed, the time and the error rate of inputting the password by the user are obtained, the verification rate of the identity of the user is obtained through a formula, the verification rate of the identity of the user is transmitted to the analysis processing module after the verification rate of the identity of the user is obtained by the identity verification module, the identity of the login user is verified through the identity verification module, the login of other people is prevented, therefore, the privacy information is stolen, and the safety performance of the system is improved;
2. the method comprises the steps that information of a webpage and information of a website are collected through a data collection module and marked as the webpage information and the website information, the webpage information comprises the reporting times, closing times and clicking times of the webpage information, the website information comprises the site monitoring times, the available times, the unavailable times and the percentage of the unavailable times, after the data collection module collects the safety coefficient of the webpage information and the reliability coefficient of the website information, the safety coefficient of the webpage information and the reliability coefficient of the website information are transmitted to an analysis processing module, a network is diagnosed, the network is prevented from being invaded, further identity information of a user is stolen, and the safety performance of the user is improved;
3. receiving a network maintenance signal through a network maintenance module, maintaining a network, and immediately restoring the modified webpage through backup; under Windows system, the present network connection condition of the system is checked through network monitoring software, if the abnormal network connection is found, the connection with the system is immediately disconnected, and then the tampered network is checked by checking the system process, the service and analyzing the log files of the system and the service so as to perform corresponding recovery; the method comprises the steps of checking a vulnerability utilized by an intrusion system by analyzing a system log file, and searching a corresponding vulnerability patch of an application program for patching; after the bug is repaired, a corresponding firewall is added, and when the network is invaded, the system immediately makes a response, so that the harm degree caused by the invasion of the network is reduced, and the safety of the network is enhanced;
4. carry out the safety maintenance measure to the server through the safety protection module, carry out the record with the safety maintenance measure and send to the database and keep, the safety maintenance measure includes: reasonably designing network layout, hot standby deployment, reinforcing server management, regularly upgrading virus libraries and reinforcing data management, wherein the reasonably designing network layout represents that an internal network is separated from a public network, and data leakage is prevented; the hot standby deployment represents that the network equipment carries out hot standby deployment to ensure the continuous and stable operation of the server; the reinforcing server management means installing antivirus software and a tamper-proof program on the server and closing a port which may bring threat on the server; the data management is enhanced by encrypting the transmission and storage of sensitive data, enhancing the management of account passwords, carrying out complexity verification on the account passwords, and carrying out security maintenance measures on the server in daily life, thereby enhancing the security of the server, reducing the probability of being invaded and ensuring that network information and user information are protected more strongly;
in conclusion, the system performs information protection from two aspects of the network and the user, has strong safety performance, can immediately make a response when the network is invaded, and also performs safety maintenance on the server daily, so that the server has stronger functions and the network invasion probability is smaller.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a network security protection method for an internet of things device specifically includes the following steps:
the method comprises the following steps: the user submits user information and an account password in the registration login module, registration is carried out according to the user information and the account password, the user information and the account password which are successfully registered are sent to a database to be stored, the user information comprises a user name, a mobile phone number and a photo for authenticating the real name of the user, and after the user logs in, the registration login module sends the user information to the identity verification module;
step two: the method comprises the following steps of verifying login information of a user through an identity verification module, wherein the login information of the user comprises the speed, time and error rate of password input by the user, and the specific verification steps are as follows:
q1: acquiring the speed of inputting the password by the user, and marking the speed when the user inputs the password as Vm;
q2: acquiring the time when the user inputs the password, and marking the time when the user inputs the password as Tm;
q3: acquiring the error rate of the password input by the user, and marking the error rate when the user inputs the password as Cm;
q4: by the formula
Figure 409939DEST_PATH_IMAGE006
Obtaining a verification rate Am of the user identity, wherein d1, d2 and d3 are preset proportionality coefficients, d1 > d2 > d3 and d1+ d2+ d3=1,
Figure 16501DEST_PATH_IMAGE002
is an error correction factor, and
Figure 196816DEST_PATH_IMAGE002
=5.698423;
q5: if the verification rate Am of the user identity is larger than or smaller than the set threshold range, the system judges that the user identity is not qualified, generates a verification failure signal and transmits the verification failure signal to the registration login module;
if the verification rate Am of the user identity is within the set threshold range, the system judges that the user identity is in accordance with the set threshold range, generates a verification success signal and transmits the verification rate Am of the user identity to the analysis processing module;
step three: the method comprises the following steps of acquiring information of a webpage through a data acquisition module, marking the information as webpage information, wherein the webpage information comprises the reporting times, closing times and clicking times of the webpage information, and the specific acquisition steps are as follows:
s1: acquiring the reporting times of the webpage information, and marking the reporting times of the webpage information as Qx;
s2: acquiring the closing times of the webpage information, and marking the closing times of the webpage information as Wx;
s3: acquiring the click times of the webpage information, and marking the click times of the webpage information as Ex;
s4: by the formula
Figure 888828DEST_PATH_IMAGE007
Acquiring a safety factor Rx of webpage information, wherein d4, d5 and d6 are preset proportionality coefficients, d4 is greater than d5 is greater than d6, and d4+ d5+ d6= 1;
s5: after the data acquisition module acquires the safety coefficient of the webpage information, transmitting the safety coefficient of the webpage information to the analysis processing module;
step four: the method comprises the following steps of acquiring website information through a data acquisition module, and marking the website information as website information, wherein the website information comprises the website monitoring times, the available times, the unavailable times and the unavailable times in percentage, and the specific acquisition steps are as follows:
SS 1: acquiring the number of website monitoring times of website information, and marking the number of website monitoring times as Yc;
SS 2: acquiring the available times of site monitoring of website information, and marking the available times of site monitoring as Uc;
SS 3: acquiring the unavailable times of site monitoring of website information, and marking the unavailable times of site monitoring as Ic;
SS 4: acquiring the percentage of the unavailable times of site monitoring of the website information, and marking the percentage of the unavailable times of site monitoring as Pc;
SS 5: by the formula
Figure 325974DEST_PATH_IMAGE008
Obtaining a reliability coefficient Mc of the website information, wherein u, v, w and x are correction factors, and the u, v, w and x are in one-to-one correspondence with the website monitoring times, the available times, the unavailable times and the unavailable times of the website information in percentage,
Figure 787043DEST_PATH_IMAGE005
in order to preset the scale factor, the method comprises the following steps,
Figure 403838DEST_PATH_IMAGE005
=2.3685964;
SS 6: after the data acquisition module acquires the reliability coefficient of the website information, the reliability coefficient of the website information is transmitted to the analysis processing module;
step five: the verification rate of the user identity, the safety factor of the webpage information and the reliability coefficient of the website information are analyzed and processed through an analysis processing module, and the specific analysis processing steps are as follows:
w1: when the verification rate of the user identity is larger than or smaller than the preset value range, the analysis processing module generates an alarm signal and sends the alarm signal to the signal processing module;
w2: when the verification rate of the user identity is within the range of preset values:
if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both smaller than a preset value K, L, generating an unauthorized access signal;
if the safety coefficient Rx of the webpage information is larger than a preset value K and the reliability coefficient Mc of the website information is smaller than a preset value L, generating a low-level authority access signal;
if the safety coefficient Rx of the webpage information is smaller than a preset value K and the reliability coefficient Mc of the website information is larger than a preset value L, generating a medium-level authority access signal;
if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both greater than a preset value K, L, generating an advanced permission access signal;
step six: the method comprises the following steps of receiving an alarm signal, an unauthorized access signal, a low-level authority access signal, a middle-level authority access signal and a high-level authority access signal through a signal processing module, processing the corresponding signals and sending the generated processing signals to a server, wherein the specific processing steps are as follows:
p1: when the signal processing module receives the alarm signal, the system judges that the identity authentication is wrong, generates a delayed re-login signal and sends the delayed re-login signal to the server;
p2: when the signal processing module receives the no-authority access signal, the low-level authority access signal and the medium-level authority access signal, the system judges that the network is invaded, generates a network maintenance signal and sends the network maintenance signal to the network maintenance module;
p3: when the signal processing module receives the advanced authority access signal, the system judges that the network is not abnormal, generates a kernel communication signal and sends the kernel communication signal to the server;
step seven: receiving a network maintenance signal through a network maintenance module and maintaining a network;
step eight: and carrying out safety maintenance measures on the server through the safety protection module, recording the safety maintenance measures and sending the safety maintenance measures to the database for storage.
Further, the specific maintenance steps of the seventh step are as follows:
t1: the modified webpage is immediately restored through backup;
t2: under Windows system, the present network connection condition of the system is checked through network monitoring software, if the abnormal network connection is found, the connection with the system is immediately disconnected, and then the tampered network is checked by checking the system process, the service and analyzing the log files of the system and the service so as to perform corresponding recovery;
t3: the method comprises the steps of checking a vulnerability utilized by an intrusion system by analyzing a system log file, and searching a corresponding vulnerability patch of an application program for patching;
t4: and after the bugs are repaired, adding corresponding firewalls.
Further, the safety maintenance measures of the step eight specifically include: reasonably designing network layout, hot standby deployment, reinforcing server management, regularly upgrading virus libraries and reinforcing data management, wherein the reasonably designing network layout represents that an internal network is separated from a public network, and data leakage is prevented; the hot standby deployment represents that the network equipment carries out hot standby deployment to ensure the continuous and stable operation of the server; the reinforcing server management means installing antivirus software and a tamper-proof program on the server and closing a port which may bring threat on the server; the data management is enhanced by encrypting the transmission and storage of sensitive data, enhancing the management of account number and password and carrying out complexity verification on the account number and the password.
The working principle of the invention is as follows:
a user submits user information and an account password in a registration login module, registration is carried out according to the user information and the account password, the user information and the account password which are successfully registered are sent to a database to be stored, webpage information is collected through a data collection module and is marked as webpage information, the webpage information comprises the reporting times, closing times and clicking times of the webpage information, and after the data collection module collects the safety factor of the webpage information, the safety factor of the webpage information is transmitted to an analysis processing module; the method comprises the steps that website information is collected through a data collection module and marked as website information, the website information comprises website monitoring times, available times, unavailable times and the percentage of the unavailable times, and after the data collection module collects the reliability coefficient of the website information, the reliability coefficient of the website information is transmitted to an analysis processing module; the verification rate of the user identity, the safety factor of the webpage information and the reliability coefficient of the website information are analyzed and processed through the analysis processing module, and when the verification rate of the user identity is within a preset value range: if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both smaller than a preset value K, L, generating an unauthorized access signal; if the safety coefficient Rx of the webpage information is larger than a preset value K and the reliability coefficient Mc of the website information is smaller than a preset value L, generating a low-level authority access signal; if the safety coefficient Rx of the webpage information is smaller than a preset value K and the reliability coefficient Mc of the website information is larger than a preset value L, generating a medium-level authority access signal; if the safety coefficient Rx of the webpage information and the reliability coefficient Mc of the website information are both greater than a preset value K, L, generating an advanced permission access signal; the signal processing module is used for receiving an alarm signal, an unauthorized access signal, a low-level authorized access signal, a middle-level authorized access signal and a high-level authorized access signal and sending corresponding signal processing results to the server; receiving a network maintenance signal through a network maintenance module, maintaining a network, and immediately restoring the modified webpage through backup; under Windows system, the present network connection condition of the system is checked through network monitoring software, if the abnormal network connection is found, the connection with the system is immediately disconnected, and then the tampered network is checked by checking the system process, the service and analyzing the log files of the system and the service so as to perform corresponding recovery; the method comprises the steps of checking a vulnerability utilized by an intrusion system by analyzing a system log file, and searching a corresponding vulnerability patch of an application program for patching; after the loopholes are repaired, adding a corresponding firewall; the safety protection module is used for carrying out safety maintenance measures on the server, recording the safety maintenance measures and sending the safety maintenance measures to the database for storage, and the safety maintenance measures comprise: reasonably designing network layout, hot standby deployment, reinforcing server management, regularly upgrading virus libraries and reinforcing data management, wherein the reasonably designing network layout represents that an internal network is separated from a public network, and data leakage is prevented; the hot standby deployment represents that the network equipment carries out hot standby deployment to ensure the continuous and stable operation of the server; the reinforcing server management means installing antivirus software and a tamper-proof program on the server and closing a port which may bring threat on the server; the data management is enhanced by encrypting the transmission and storage of sensitive data, enhancing the management of account number and password and carrying out complexity verification on the account number and the password.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (7)

1. A network security protection method of Internet of things equipment is characterized by comprising the following steps;
the method comprises the following steps: a user submits user information and an account password in a registration login module, registration is carried out according to the user information and the account password, the user information and the account password which are successfully registered are sent to a database to be stored, and after the user logs in, the registration login module sends the user information to an identity verification module;
step two: verifying login information of a user through an identity verification module, wherein the login information of the user comprises the speed, time and error rate of password input by the user, and if the verification rate Am of the user identity is within a set threshold range, judging that the user identity is in accordance by a system, generating a verification success signal, and transmitting the verification rate of the user identity to an analysis processing module;
step three: acquiring information of a webpage through a data acquisition module, marking the information as webpage information, wherein the webpage information comprises the reporting times, closing times and clicking times of the webpage information, and transmitting the safety coefficient of the webpage information to an analysis processing module after the data acquisition module acquires the safety coefficient of the webpage information;
step four: the method comprises the steps that website information is collected through a data collection module and marked as website information, the website information comprises website monitoring times, available times, unavailable times and the percentage of the unavailable times, and after the data collection module collects the reliability coefficient of the website information, the reliability coefficient of the website information is transmitted to an analysis processing module;
step five: the verification rate of the user identity, the safety factor of the webpage information and the reliability coefficient of the website information are analyzed and processed through an analysis processing module, and the specific analysis processing steps are as follows:
w1: when the verification rate of the user identity is larger than or smaller than the set threshold range, the analysis processing module generates an alarm signal and sends the alarm signal to the signal processing module;
w2: when the verification rate of the user identity is within a set threshold range:
if the safety coefficient Rx of the webpage information is smaller than a preset value K and the reliability coefficient Mc of the website information is smaller than a preset value L, generating an unauthorized access signal;
if the safety coefficient Rx of the webpage information is larger than a preset value K and the reliability coefficient Mc of the website information is smaller than a preset value L, generating a low-level authority access signal;
if the safety coefficient Rx of the webpage information is smaller than a preset value K and the reliability coefficient Mc of the website information is larger than a preset value L, generating a medium-level authority access signal;
if the safety coefficient Rx of the webpage information is greater than a preset value K and the reliability coefficient Mc of the website information is greater than a preset value L, generating an advanced permission access signal;
step six: the method comprises the following steps of receiving an alarm signal, an unauthorized access signal, a low-level authority access signal, a middle-level authority access signal and a high-level authority access signal through a signal processing module, processing the corresponding signals and sending the generated processing signals to a server, wherein the specific processing steps are as follows:
p1: when the signal processing module receives the alarm signal, the system judges that the identity authentication is wrong, generates a delayed re-login signal and sends the delayed re-login signal to the server;
p2: when the signal processing module receives the no-authority access signal, the low-level authority access signal and the medium-level authority access signal, the system judges that the network is invaded, generates a network maintenance signal and sends the network maintenance signal to the network maintenance module;
p3: when the signal processing module receives the advanced authority access signal, the system judges that the network is not abnormal, generates a kernel communication signal and sends the kernel communication signal to the server;
step seven: receiving a network maintenance signal through a network maintenance module and maintaining a network;
step eight: and carrying out safety maintenance measures on the server through the safety protection module, recording the safety maintenance measures and sending the safety maintenance measures to the database for storage.
2. The network security protection method for the internet of things equipment as claimed in claim 1, wherein the user information comprises a name of the user, a mobile phone number authenticated by the real name of the user and a photo.
3. The network security protection method of the internet of things equipment according to claim 1, wherein the specific verification step of the second step is as follows:
q1: acquiring the speed of inputting the password by the user, and marking the speed when the user inputs the password as Vm;
q2: acquiring the time when the user inputs the password, and marking the time when the user inputs the password as Tm;
q3: acquiring the error rate of the password input by the user, and marking the error rate when the user inputs the password as Cm;
q4: by the formula
Figure 195416DEST_PATH_IMAGE001
Obtaining a verification rate Am of the user identity, wherein d1, d2 and d3 are preset proportionality coefficients, d1 > d2 > d3 and d1+ d2+ d3=1,
Figure 643715DEST_PATH_IMAGE003
is an error correction factor, and
Figure 79244DEST_PATH_IMAGE004
=5.698423;
q5: and if the verification rate Am of the user identity is larger than or smaller than the set threshold range, the system judges that the user identity is not qualified, generates a verification failure signal and transmits the verification failure signal to the login module.
4. The network security protection method of the internet of things equipment according to claim 1, wherein the specific acquisition step of the third step is as follows:
s1: acquiring the reporting times of the webpage information, and marking the reporting times of the webpage information as Qx;
s2: acquiring the closing times of the webpage information, and marking the closing times of the webpage information as Wx;
s3: acquiring the click times of the webpage information, and marking the click times of the webpage information as Ex;
s4: by the formula
Figure 740032DEST_PATH_IMAGE005
And acquiring a safety factor Rx of the webpage information, wherein d4, d5 and d6 are preset proportionality coefficients, d4 > d5 > d6 and d4+ d5+ d6= 1.
5. The network security protection method of the internet of things equipment according to claim 1, wherein the specific acquisition step of the fourth step is as follows:
SS 1: acquiring the number of website monitoring times of website information, and marking the number of website monitoring times as Yc;
SS 2: acquiring the available times of site monitoring of website information, and marking the available times of site monitoring as Uc;
SS 3: acquiring the unavailable times of site monitoring of website information, and marking the unavailable times of site monitoring as Ic;
SS 4: acquiring the percentage of the unavailable times of site monitoring of the website information, and marking the percentage of the unavailable times of site monitoring as Pc;
SS 5: by the formula
Figure 85563DEST_PATH_IMAGE006
Obtaining a reliability coefficient Mc of the website information, wherein u, v, w and x are correction factors, and the u, v, w and x are in one-to-one correspondence with the website monitoring times, the available times, the unavailable times and the unavailable times of the website information in percentage,
Figure 314550DEST_PATH_IMAGE007
in order to preset the scale factor, the method comprises the following steps,
Figure 112742DEST_PATH_IMAGE007
=2.3685964。
6. the network security protection method of the internet of things equipment according to claim 1, wherein the specific maintenance steps of the seventh step are as follows:
t1: the modified webpage is immediately restored through backup;
t2: under Windows system, the present network connection condition of the system is checked through network monitoring software, if the abnormal network connection is found, the connection with the system is immediately disconnected, and then the tampered network is checked by checking the system process, the service and analyzing the log files of the system and the service so as to perform corresponding recovery;
t3: the method comprises the steps of checking a vulnerability utilized by an intrusion system by analyzing a system log file, and searching a corresponding vulnerability patch of an application program for patching;
t4: and after the bugs are repaired, adding corresponding firewalls.
7. The network security protection method for the internet of things equipment according to claim 1, wherein the security maintenance measures of the step eight specifically include: reasonably designing network layout, hot standby deployment, reinforcing server management, regularly upgrading virus libraries and reinforcing data management, wherein the reasonably designing network layout represents that an internal network is separated from a public network, and data leakage is prevented; the hot standby deployment represents the hot standby deployment of the network equipment, and the continuous and stable operation of the server is guaranteed; the reinforcing server management means that antivirus software and a tamper-resistant program are installed on the server, and a port which can bring threat to the server is closed; the data management is enhanced by adopting encryption measures for transmission and storage of sensitive data, enhancing account password management and carrying out complexity verification on account passwords.
CN202010802202.3A 2020-08-11 2020-08-11 Network security protection method for Internet of things equipment Active CN111683157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010802202.3A CN111683157B (en) 2020-08-11 2020-08-11 Network security protection method for Internet of things equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010802202.3A CN111683157B (en) 2020-08-11 2020-08-11 Network security protection method for Internet of things equipment

Publications (2)

Publication Number Publication Date
CN111683157A CN111683157A (en) 2020-09-18
CN111683157B true CN111683157B (en) 2020-11-03

Family

ID=72458239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010802202.3A Active CN111683157B (en) 2020-08-11 2020-08-11 Network security protection method for Internet of things equipment

Country Status (1)

Country Link
CN (1) CN111683157B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187787B (en) * 2020-09-27 2023-10-10 广州瀚信通信科技股份有限公司 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN112217672B (en) * 2020-09-30 2022-10-21 安徽极玩云科技有限公司 Service processing system for CDN platform
CN112465513A (en) * 2020-11-30 2021-03-09 滨州学院 Network security system and method based on identity authentication
CN112583804B (en) * 2020-12-05 2022-02-25 苏州小棉袄信息技术股份有限公司 Monitoring management system capable of tracking and evidence obtaining of network illegal behaviors in real time
CN112819670A (en) * 2021-01-08 2021-05-18 北京嘀嘀无限科技发展有限公司 Information processing method and device, readable storage medium and electronic equipment
CN113259505B (en) * 2021-06-30 2022-12-13 深圳供电局有限公司 Automatic dynamic IP address allocation system convenient for master station network
CN113726769B (en) * 2021-08-28 2023-07-04 睿思网盾(北京)科技有限公司 Network security prevention and control system based on data acquisition
CN114584382B (en) * 2022-03-08 2024-02-02 广东南方电信规划咨询设计院有限公司 Security management method and system for wireless data transmission
CN115955363B (en) * 2023-03-13 2023-06-20 江苏先驰物联网技术有限公司 Communication terminal based on desktop fusion

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065147A (en) * 2011-01-07 2011-05-18 深圳市易聆科信息技术有限公司 Method and device for obtaining user login information based on enterprise application system
US8751628B2 (en) * 2009-05-05 2014-06-10 Suboti, Llc System and method for processing user interface events
CN109361646A (en) * 2018-08-23 2019-02-19 广东电网有限责任公司信息中心 Network security monitoring and cognitive method in a kind of application of mobile interchange
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351287A (en) * 2019-07-17 2019-10-18 江苏南工科技集团有限公司 A kind of mobile application security analysis method based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8751628B2 (en) * 2009-05-05 2014-06-10 Suboti, Llc System and method for processing user interface events
CN102065147A (en) * 2011-01-07 2011-05-18 深圳市易聆科信息技术有限公司 Method and device for obtaining user login information based on enterprise application system
CN109361646A (en) * 2018-08-23 2019-02-19 广东电网有限责任公司信息中心 Network security monitoring and cognitive method in a kind of application of mobile interchange
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Also Published As

Publication number Publication date
CN111683157A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN111683157B (en) Network security protection method for Internet of things equipment
CN114978584A (en) Network security protection safety method and system based on unit cell
CN201846355U (en) Safety consultation system
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN113660224B (en) Situation awareness defense method, device and system based on network vulnerability scanning
EP4229532B1 (en) Behavior detection and verification
Yadav et al. Assessment of SCADA system vulnerabilities
CN117708880A (en) Intelligent security processing method and system for banking data
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
Permann et al. Cyber assessment methods for SCADA security
EP1378813B1 (en) Security policy enforcement systems
Djemaiel et al. Intrusion detection and tolerance: A global scheme
Ghadge Enhancing threat detection in Identity and Access Management (IAM) systems
Yassine et al. Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy
Tafazzoli et al. Security operation center implementation on OpenStack
Rose et al. System hardening for infrastructure as a service (IaaS)
Leniski et al. Securing the biometric model
US12041067B2 (en) Behavior detection and verification
Cai et al. Medical big data intrusion detection system based on virtual data analysis from assurance perspective
Malek et al. GUI-based user behavior intrusion detection
Shin et al. Threat modeling for security failure-tolerant requirements
Xiong et al. Web and Database Security
Dano Systems Engineering Integration and Test Challenges due to Security Measures in a Cloud‐Based System
Stutz et al. Cyber Threat Detection and Mitigation Using Artificial Intelligence–A Cyber‐physical Perspective
Islam et al. Security requirements addressing security risks for improving software quality

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant