CN111935198B - Visual V2X network security defense method and equipment - Google Patents

Visual V2X network security defense method and equipment Download PDF

Info

Publication number
CN111935198B
CN111935198B CN202011100083.3A CN202011100083A CN111935198B CN 111935198 B CN111935198 B CN 111935198B CN 202011100083 A CN202011100083 A CN 202011100083A CN 111935198 B CN111935198 B CN 111935198B
Authority
CN
China
Prior art keywords
vlan
network
visual
video module
network security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011100083.3A
Other languages
Chinese (zh)
Other versions
CN111935198A (en
Inventor
姜晓博
杨柯
钱亚荣
许锐
赵小玉
王恩练
王杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South Sagittarius Integration Co Ltd
Original Assignee
South Sagittarius Integration Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South Sagittarius Integration Co Ltd filed Critical South Sagittarius Integration Co Ltd
Priority to CN202011100083.3A priority Critical patent/CN111935198B/en
Publication of CN111935198A publication Critical patent/CN111935198A/en
Application granted granted Critical
Publication of CN111935198B publication Critical patent/CN111935198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a visual V2X network security defense method and equipment. The method comprises the following steps: according to the determined version to be demonstrated, dividing VLAN areas of the video module; and starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload, and displaying the blocking process in real time. The visual V2X network security defense method and equipment provided by the embodiment of the invention can intuitively display the domain control security of the vehicle-mounted V2X system, the destructive effect of the vehicle under network attack and the protection effect after a network defense mechanism is started.

Description

Visual V2X network security defense method and equipment
Technical Field
The embodiment of the invention relates to the technical field of network security, in particular to a visual V2X network security defense method and equipment.
Background
Currently, attacks in the V2X network do not exist in real time, and most of the related network defense technologies exist in the form of software, so that the attacks cannot be displayed intuitively, and users cannot fully know the importance of the V2X network security. Therefore, it is an urgent technical problem in the art to develop a visual V2X network security defense method and apparatus, which can effectively overcome the above-mentioned drawbacks in the related art.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a visual V2X network security defense method and equipment.
In a first aspect, an embodiment of the present invention provides a visual V2X network security defense method, including: according to the determined version to be demonstrated, dividing VLAN areas of the video module; and starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload, and displaying the blocking process in real time.
On the basis of the content of the above method embodiment, the visual V2X network security defense method provided in the embodiment of the present invention further includes, before the version to be demonstrated according to the determination, that: entering a safety visualization system demonstration box screen of a V2X network, and further entering a video module interface; after the safe visual system demonstration box displays the image, an IP address is obtained in a browser; and entering a gateway management interface through a gateway login interface to determine the version to be demonstrated.
On the basis of the content of the above method embodiment, the visual V2X network security defense method provided in the embodiment of the present invention, where the dividing of the VLAN region for the video module includes: the video module is divided into two VLAN areas, and the two VLAN areas are isolated from each other in communication.
On the basis of the content of the above method embodiment, in the visual V2X network security defense method provided in the embodiment of the present invention, the starting attack procedure performs broadband traffic overload on the video module divided into the VLAN region, and includes: and the attack program carries out broadband flow overload on one VLAN area in the two VLAN areas, and a video module in the VLAN area cannot acquire video information.
On the basis of the content of the embodiment of the method, the visual V2X network security defense method provided in the embodiment of the present invention, where the network defense mechanism is started to block the broadband traffic overload, includes: and starting a network defense mechanism, blocking the broadband flow overload of the VLAN area, and enabling the video module in the VLAN area to acquire the video information again.
On the basis of the content of the above method embodiment, the visual V2X network security defense method provided in the embodiment of the present invention further includes, after the blocking process is shown in real time: and closing a network defense mechanism, and carrying out broadband flow overload on the VLAN area again by the attack program, wherein the video module in the VLAN area can not acquire video information again.
On the basis of the content of the foregoing method embodiment, the visual V2X network security defense method provided in the embodiment of the present invention further includes, after the video module in the VLAN region cannot acquire video information again, that: and closing the attack program, and acquiring the video information again by the video module in the VLAN area.
In a second aspect, an embodiment of the present invention provides a visual V2X network security defense device, including:
the area division module is used for dividing the VLAN area of the video module according to the determined version to be demonstrated;
and the defense display module is used for starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload and displaying the blocking process in real time.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor calling the program instructions capable of executing the visual V2X network security defense method provided by any of the various implementations of the first aspect.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method for visual V2X network security defense provided in any of the various implementations of the first aspect.
According to the visual V2X network security defense method and device provided by the embodiment of the invention, the video module is subjected to VLAN area division, the video module is distributed into different VLAN areas, the network defense mechanism is matched to block an attack program, and the blocking process is displayed in real time, so that the domain control security of the vehicle-mounted V2X system, the damage effect of the vehicle under network attack and the protection effect after the network defense mechanism is started can be visually displayed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description will be given below to the drawings required for the description of the embodiments or the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a visual V2X network security defense method provided in an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a visual V2X network security defense device according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, technical features of various embodiments or individual embodiments provided by the present invention may be arbitrarily combined with each other to form a feasible technical solution, and such combination is not limited by the sequence of steps and/or the structural composition mode, but must be realized by a person skilled in the art, and when the technical solution combination is contradictory or cannot be realized, such a technical solution combination should not be considered to exist and is not within the protection scope of the present invention.
The embodiment of the invention provides a visual V2X network security defense method, and referring to FIG. 1, the method comprises the following steps:
101. according to the determined version to be demonstrated, dividing VLAN areas of the video module;
102. and starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload, and displaying the blocking process in real time.
It should be noted that the network defense mechanism mainly includes: the firewall is a commonly used defense software in a computer system, can effectively protect an internal network, and intercepts attacks from the outside and malicious plug-ins, so that the computer can have a safe and stable running environment. The method has the main function of establishing an invisible barrier between the internal network of the computer and the Internet, thereby realizing the security protection of the internal network. Firewalls are typically installed at the connection of an intranet to an extranet. The purpose of this is to make all information from outside enter the internal network through the firewall, so that the firewall can screen it to allow some harmless information to pass, and link out some malicious or virus-carrying software. The system can check data among a plurality of networks, and can also track the running state of the networks in real time; the network encryption technology is developed in response to the problem of computing network security, and various power transaction systems based on the internet can appear and can be developed and popularized. Practice proves that the modern society, online shopping and electronic commerce are not rare, and the secure confidential technology opens up another era. It has two encryption modes, one is symmetric encryption and the other is asymmetric encryption. However, with the development of science and technology, the technical level is higher and more perfect, and an effective guarantee is provided for the benefit of people; the intrusion detection technology is mainly a technology for collecting various information from a plurality of systems and resources, the technology can not only realize the acquisition of the information, but also analyze and screen the information, the application of the detection technology improves the probability of finding the attack behavior by the system, if some attack behaviors occur, the system can give an alarm, and the technology can also monitor different users, can identify abnormal behaviors and can analyze and track the behaviors; the network security scanning technology can accurately master security holes in a computer network system, take measures in time and effectively avoid system security risks.
Based on the content of the foregoing method embodiment, as an optional embodiment, the method for defending network security of the visual V2X provided in the embodiment of the present invention, before the version to be demonstrated according to the determination, further includes: entering a safety visualization system demonstration box screen of a V2X network, and further entering a video module interface; after the safe visual system demonstration box displays the image, an IP address is obtained in a browser; and entering a gateway management interface through a gateway login interface to determine the version to be demonstrated.
Specifically, the method comprises the steps of entering a V2X network security visualization system demonstration box screen according to step operation, and finally entering a camera interface; after the power is turned on, the display screen with the demonstration box displays images, a browser is opened, and an IP address 192.168.1.1 is input in an address box; entering a gateway login interface, wherein a user name is as follows: root, password: 1. Clicking a logic to enter a gateway management interface; according To the function type To be demonstrated, a switching button (To extension version under the basic version, To basic version under the extension version and basic version by default) is clicked.
Based on the content of the foregoing method embodiment, as an optional embodiment, the visual V2X network security defense method provided in the embodiment of the present invention, where the dividing of the VLAN region for the video module includes: the video module is divided into two VLAN areas, and the two VLAN areas are isolated from each other in communication.
VLAN divides the main purpose to make different equipment worker work in different fields, after dividing through VLAN, if a certain field is attacked can make it a solitary field and avoid other equipment to receive the influence, represent two equipment with two cameras in the demonstration. Specifically, when the equipment is not operated, two cameras on a screen of the demonstration box can normally communicate, namely the two cameras can normally communicate before being started; and clicking an open switch in the VLAN to open the VLAN division function. After waiting ten seconds, one of the screens displays no signal. The VLAN partition at this time cannot communicate between two different domains. And clicking a close switch in the VLAN to close the VLAN division function. After waiting for ten seconds, the screen without signal returns to normal. The cameras resume connection and the cameras in the same domain (i.e. the specific implementation of the video module in the foregoing embodiment) can communicate with each other.
Based on the content of the foregoing method embodiment, as an optional embodiment, in the visual V2X network security defense method provided in the embodiment of the present invention, the starting attack procedure performs broadband traffic overload on the video module divided into the VLAN region, and includes: and the attack program carries out broadband flow overload on one VLAN area in the two VLAN areas, and a video module in the VLAN area cannot acquire video information.
Specifically, when the device is not yet operated, both cameras of the demonstration box screen can normally communicate (i.e., before the demonstration starts, both cameras are normally used). The notebook computer is opened and the desktop open icon is double clicked. And the attack program can be opened after the password is input. Clicking Attack 1, the tool will Attack according to the preset configuration automatically. Clicking the attach start starts to Attack the device. The straight line represents incoming traffic and the curve represents outgoing traffic, where it can be seen that the curve rises very fast until it reaches the top, indicating that the attack has filled the device bandwidth (i.e., the broadband traffic is overloaded). As the broadband flow is overloaded, one camera is attacked, the connection between the camera and the screen is lost, and no signal is displayed on the screen.
Based on the content of the foregoing method embodiment, as an optional embodiment, the visual V2X network security defense method provided in the embodiment of the present invention, where the network defense mechanism is started to block the broadband traffic overload, includes: and starting a network defense mechanism, blocking the broadband flow overload of the VLAN area, and enabling the video module in the VLAN area to acquire the video information again.
Specifically, an open switch in network defense is clicked, and a defense function is turned on. After several tens of seconds, the image of the camera is displayed on the screen again (namely the attacked camera returns to normal), which indicates that the blocking attack is successful. In particular, the curve has dropped to the same level as the straight line, and it can be seen that the attack is effectively blocked and the bandwidth is restored to be clear.
Based on the content of the foregoing method embodiment, as an optional embodiment, the visual V2X network security defense method provided in the embodiment of the present invention further includes, after the blocking process is shown in real time: and closing a network defense mechanism, and carrying out broadband flow overload on the VLAN area again by the attack program, wherein the video module in the VLAN area can not acquire video information again.
Specifically, a close switch in the network defense is clicked, and the network defense function is closed. After tens of seconds, the camera which is not protected is attacked again, and the connection with the screen is lost.
Based on the content of the foregoing method embodiment, as an optional embodiment, the visual V2X network security defense method provided in the embodiment of the present invention further includes, after the video module in the VLAN region cannot acquire video information again, that: and closing the attack program, and acquiring the video information again by the video module in the VLAN area.
Specifically, clicking the attach stop in the Attack tool closes the Attack program. After tens of seconds, the cameras are connected with the screen again, and both the cameras operate normally.
According to the visual V2X network security defense method provided by the embodiment of the invention, the video module is partitioned into the VLAN areas, the video module is distributed into different VLAN areas, the attack program is blocked by matching with a network defense mechanism, and the blocking process is displayed in real time, so that the domain control security of the vehicle-mounted V2X system, the damage effect of the vehicle under network attack and the protection effect after the network defense mechanism is started can be visually displayed.
The implementation basis of the various embodiments of the present invention is realized by programmed processing performed by a device having a processor function. Therefore, in engineering practice, the technical solutions and functions thereof of the embodiments of the present invention can be packaged into various modules. Based on the actual situation, on the basis of the above embodiments, the embodiments of the present invention provide a visual V2X network security defense apparatus, which is used to execute the visual V2X network security defense method in the above method embodiments. Referring to fig. 2, the apparatus includes:
the area division module 201 is used for dividing the video module into VLAN areas according to the determined version to be demonstrated;
the defense display module 202 is used for starting an attack program to carry out broadband traffic overload on the video module divided with the VLAN area, starting a network defense mechanism to block the broadband traffic overload, and displaying the blocking process in real time.
The visual V2X network security defense device provided by the embodiment of the invention adopts the area division module and the defense display module, allocates the video module to different VLAN areas by dividing the video module into the VLAN areas, then blocks an attack program by matching with a network defense mechanism, and displays the blocking process in real time, so that the domain control security of the vehicle-mounted V2X system, the damage effect of the vehicle under network attack and the protection effect after the network defense mechanism is started can be visually displayed.
It should be noted that, the apparatus in the apparatus embodiment provided by the present invention may be used for implementing methods in other method embodiments provided by the present invention, except that corresponding function modules are provided, and the principle of the apparatus embodiment provided by the present invention is basically the same as that of the apparatus embodiment provided by the present invention, so long as a person skilled in the art obtains corresponding technical means by combining technical features on the basis of the apparatus embodiment described above, and obtains a technical solution formed by these technical means, on the premise of ensuring that the technical solution has practicability, the apparatus in the apparatus embodiment described above may be modified, so as to obtain a corresponding apparatus class embodiment, which is used for implementing methods in other method class embodiments. For example:
based on the content of the above device embodiment, as an optional embodiment, the visual V2X network security defense device provided in the embodiment of the present invention further includes: and the VLAN module is used for dividing the video module into two VLAN areas, and the two VLAN areas are isolated from each other in communication.
Based on the content of the above device embodiment, as an optional embodiment, the visual V2X network security defense device provided in the embodiment of the present invention further includes: and the flow overload module is used for carrying out broadband flow overload on one VLAN area in the two VLAN areas by an attack program, and the video module in the VLAN area can not acquire video information.
Based on the content of the above device embodiment, as an optional embodiment, the visual V2X network security defense device provided in the embodiment of the present invention further includes: and the blocking module is used for starting a network defense mechanism, blocking the broadband flow overload of the VLAN area, and the video module in the VLAN area acquires the video information again.
Based on the content of the above device embodiment, as an optional embodiment, the visual V2X network security defense device provided in the embodiment of the present invention further includes: and the network defense mechanism closing module is used for closing the network defense mechanism, the attack program carries out broadband flow overload on the VLAN area again, and the video module in the VLAN area can not acquire video information again.
Based on the content of the above device embodiment, as an optional embodiment, the visual V2X network security defense device provided in the embodiment of the present invention further includes: and the attack program closing module is used for closing the attack program, and the video module in the VLAN area acquires the video information again.
The method of the embodiment of the invention is realized by depending on the electronic equipment, so that the related electronic equipment is necessarily introduced. To this end, an embodiment of the present invention provides an electronic apparatus, as shown in fig. 3, including: at least one processor (processor)301, a communication Interface (Communications Interface)304, at least one memory (memory)302 and a communication bus 303, wherein the at least one processor 301, the communication Interface 304 and the at least one memory 302 are configured to communicate with each other via the communication bus 303. The at least one processor 301 may invoke logic instructions in the at least one memory 302 to perform all or a portion of the steps of the methods provided by the various method embodiments described above.
Furthermore, the logic instructions in the at least one memory 302 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the method embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. Based on this recognition, each block in the flowchart or block diagrams may represent a module, a program segment, or a portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In this patent, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A visual V2X network security defense method is characterized by comprising the following steps:
according to the determined version to be demonstrated, dividing VLAN areas of the video module;
and starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload, and displaying the blocking process in real time.
2. The visualization V2X network security defense method according to claim 1, further comprising, before the version to be demonstrated according to the determination: entering a safety visualization system demonstration box screen of a V2X network, and further entering a video module interface; after the safe visual system demonstration box displays the image, an IP address is obtained in a browser; and entering a gateway management interface through a gateway login interface to determine the version to be demonstrated.
3. The visual V2X network security defense method of claim 1, wherein the dividing of the video module into VLAN areas comprises: the video module is divided into two VLAN areas, and the two VLAN areas are isolated from each other in communication.
4. The visual V2X network security defense method of claim 3, wherein the starting attack procedure performs broadband traffic overload on the video module divided into VLAN areas, comprising: and the attack program carries out broadband flow overload on one VLAN area in the two VLAN areas, and a video module in the VLAN area cannot acquire video information.
5. The visual V2X network security defense method of claim 4, wherein the merging of network defense mechanisms to block the broadband traffic overload comprises: and starting a network defense mechanism, blocking the broadband flow overload of the VLAN area, and enabling the video module in the VLAN area to acquire the video information again.
6. The visual V2X network security defense method according to claim 5, further comprising, after the real-time presentation of the blocking process: and closing a network defense mechanism, and carrying out broadband flow overload on the VLAN area again by the attack program, wherein the video module in the VLAN area can not acquire video information again.
7. The visual V2X network security defense method of claim 6, wherein after the video module in the VLAN area is again unable to obtain video information, further comprising: and closing the attack program, and acquiring the video information again by the video module in the VLAN area.
8. A visual V2X network security defense device, comprising:
the area division module is used for dividing the VLAN area of the video module according to the determined version to be demonstrated;
and the defense display module is used for starting an attack program to carry out broadband flow overload on the video module divided with the VLAN area, starting a network defense mechanism, blocking the broadband flow overload and displaying the blocking process in real time.
9. An electronic device, comprising:
at least one processor, at least one memory, and a communication interface; wherein the content of the first and second substances,
the processor, the memory and the communication interface are communicated with each other;
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 7.
10. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 7.
CN202011100083.3A 2020-10-15 2020-10-15 Visual V2X network security defense method and equipment Active CN111935198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011100083.3A CN111935198B (en) 2020-10-15 2020-10-15 Visual V2X network security defense method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011100083.3A CN111935198B (en) 2020-10-15 2020-10-15 Visual V2X network security defense method and equipment

Publications (2)

Publication Number Publication Date
CN111935198A CN111935198A (en) 2020-11-13
CN111935198B true CN111935198B (en) 2021-01-15

Family

ID=73334764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011100083.3A Active CN111935198B (en) 2020-10-15 2020-10-15 Visual V2X network security defense method and equipment

Country Status (1)

Country Link
CN (1) CN111935198B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257379A (en) * 2008-03-31 2008-09-03 华为技术有限公司 Collocating method for preventing attack of network, method and apparatus for preventing attack
CN101753315A (en) * 2008-11-27 2010-06-23 百度在线网络技术(北京)有限公司 Method, device and system for testing DDOS (distributed denial of service) attacks
WO2018108293A1 (en) * 2016-12-16 2018-06-21 Huawei Technologies Co., Ltd. Methods, devices and vehicles for authenticating a vehicle during a cooperative maneuver
CN111212064A (en) * 2019-12-31 2020-05-29 北京安码科技有限公司 Method, system, equipment and storage medium for simulating attack behavior of shooting range

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10250619B1 (en) * 2015-06-17 2019-04-02 Mission Secure, Inc. Overlay cyber security networked system and method
US10594732B2 (en) * 2016-11-08 2020-03-17 Ca, Inc. Selective traffic blockage
KR20180072342A (en) * 2016-12-21 2018-06-29 주식회사 휴맥스오토모티브 Methods of secure processing at in-vehicle network having Ethernet network considering priority of V2X message
CN107332698A (en) * 2017-06-19 2017-11-07 西北大学 A kind of Security Situation Awareness Systems and method towards bright Great Wall intelligent perception system
CN108183954A (en) * 2017-12-28 2018-06-19 北京奇虎科技有限公司 A kind of detection method and device of vehicle safety
CN107959689B (en) * 2018-01-10 2020-09-25 北京工业大学 Cloud platform tenant network isolation test method
CN108777643A (en) * 2018-06-08 2018-11-09 武汉思普崚技术有限公司 A kind of traffic visualization plateform system
WO2020085421A1 (en) * 2018-10-24 2020-04-30 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Fraud detection device and fraud detection method
CN109558729B (en) * 2018-11-28 2021-09-07 河北省科学院应用数学研究所 Intelligent defense system for network attack
CN110535863A (en) * 2019-08-30 2019-12-03 北京先勤科技有限公司 A kind of car networking communication simulation method, system and platform and computer readable storage medium
CN110719214A (en) * 2019-10-11 2020-01-21 天津卡达克数据有限公司 Internet of vehicles safety test oriented experimental platform and test method
CN111030837B (en) * 2019-10-28 2023-04-18 安天科技集团股份有限公司 Network environment current situation assessment method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257379A (en) * 2008-03-31 2008-09-03 华为技术有限公司 Collocating method for preventing attack of network, method and apparatus for preventing attack
CN101753315A (en) * 2008-11-27 2010-06-23 百度在线网络技术(北京)有限公司 Method, device and system for testing DDOS (distributed denial of service) attacks
WO2018108293A1 (en) * 2016-12-16 2018-06-21 Huawei Technologies Co., Ltd. Methods, devices and vehicles for authenticating a vehicle during a cooperative maneuver
CN111212064A (en) * 2019-12-31 2020-05-29 北京安码科技有限公司 Method, system, equipment and storage medium for simulating attack behavior of shooting range

Also Published As

Publication number Publication date
CN111935198A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
US11729193B2 (en) Intrusion detection system enrichment based on system lifecycle
Duncan et al. An overview of insider attacks in cloud computing
US11824878B2 (en) Malware detection at endpoint devices
US11601457B2 (en) Network traffic correlation engine
US20190042736A1 (en) Iintrusion detection system enrichment based on system lifecycle
US20190132353A1 (en) Service overload attack protection based on selective packet transmission
CN112532631A (en) Equipment safety risk assessment method, device, equipment and medium
Baraka et al. Intrusion detection system for cloud environment
CN113411297A (en) Situation awareness defense method and system based on attribute access control
Beigh et al. Intrusion detection and prevention system: issues and challenges
Jaiswal CYBERCRIME CATEGORIES AND PREVENTION
Le et al. A threat computation model using a Markov Chain and common vulnerability scoring system and its application to cloud security
CN111935198B (en) Visual V2X network security defense method and equipment
Jain et al. Cybersecurity solutions using AI techniques
Transportation yber Security i OChaII ‘enges
Gomez et al. Hands-on lab on smart city vulnerability exploitation
CN113141274A (en) Method, system and storage medium for detecting sensitive data leakage in real time based on network hologram
CN111914998A (en) Training method and device for server attack information generator
CN113127855A (en) Safety protection system and method
Bhardwaj Cybersecurity incident response against advanced persistent threats (APTs)
CN113191917B (en) Power plant industrial control system network security threat classification method based on radial basis function algorithm
Stoleriu et al. Modern Cyber Security Attacks, Detection Strategies, and Countermeasures Procedures
Thakkar et al. Enhancement of Cloud Security Using Snort
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Ogheneovo et al. Implementing a Robust Network-Based Intrusion Detection System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Jiang Xiaobo

Inventor after: Yang Ke

Inventor after: Qian Yarong

Inventor after: Xu Rui

Inventor after: Zhao Xiaoyu

Inventor after: Wang Enlian

Inventor after: Wang Jie

Inventor before: Jiang Xiaobo

Inventor before: Yang Ke

Inventor before: Qian Yarong

Inventor before: Xu Rui

Inventor before: Zhao Xiaoyu

Inventor before: Wang Enlian

Inventor before: Wang Jie

CB03 Change of inventor or designer information