CN112333166B - Attack mode automatic identification system based on Internet of things - Google Patents
Attack mode automatic identification system based on Internet of things Download PDFInfo
- Publication number
- CN112333166B CN112333166B CN202011163524.4A CN202011163524A CN112333166B CN 112333166 B CN112333166 B CN 112333166B CN 202011163524 A CN202011163524 A CN 202011163524A CN 112333166 B CN112333166 B CN 112333166B
- Authority
- CN
- China
- Prior art keywords
- attack
- module
- host
- automatic identification
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
- G16Y30/10—Security thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011163524.4A CN112333166B (en) | 2020-10-27 | 2020-10-27 | Attack mode automatic identification system based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011163524.4A CN112333166B (en) | 2020-10-27 | 2020-10-27 | Attack mode automatic identification system based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112333166A CN112333166A (en) | 2021-02-05 |
CN112333166B true CN112333166B (en) | 2023-04-18 |
Family
ID=74296456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011163524.4A Active CN112333166B (en) | 2020-10-27 | 2020-10-27 | Attack mode automatic identification system based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112333166B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114679291B (en) * | 2021-05-31 | 2024-04-09 | 北京网藤科技有限公司 | System for be used for industrial network intrusion monitoring |
CN114629676B (en) * | 2021-11-26 | 2024-03-19 | 中国大唐集团科学技术研究院有限公司火力发电技术研究院 | Safety protection system and method for thermal power generating unit fuel system |
CN114285623B (en) * | 2021-12-21 | 2023-01-20 | 北京永信至诚科技股份有限公司 | Evaluation method and device for network security honeypot system indexes |
CN114640527B (en) * | 2022-03-21 | 2023-03-24 | 重庆市规划和自然资源信息中心 | Real estate registration service network security risk identification method and system based on log audit |
CN116578434B (en) * | 2023-05-15 | 2023-10-20 | 合芯科技(苏州)有限公司 | Information notification management system and method for IC design platform |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101567888B (en) * | 2008-12-29 | 2011-12-21 | 郭世泽 | Safety protection method of network feedback host computer |
CN108259472A (en) * | 2017-12-28 | 2018-07-06 | 广州锦行网络科技有限公司 | Dynamic joint defence mechanism based on attack analysis realizes system and method |
US11354406B2 (en) * | 2018-06-28 | 2022-06-07 | Intel Corporation | Physics-based approach for attack detection and localization in closed-loop controls for autonomous vehicles |
CN110099060A (en) * | 2019-05-07 | 2019-08-06 | 瑞森网安(福建)信息科技有限公司 | A kind of network information security guard method and system |
CN111490970A (en) * | 2020-02-19 | 2020-08-04 | 西安交大捷普网络科技有限公司 | Tracing analysis method for network attack |
-
2020
- 2020-10-27 CN CN202011163524.4A patent/CN112333166B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112333166A (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112333166B (en) | Attack mode automatic identification system based on Internet of things | |
CN103413088B (en) | A kind of computer document operation safety auditing system | |
CN108632276B (en) | Computer network information safety system | |
CN105553940A (en) | Safety protection method based on big data processing platform | |
CN115314286A (en) | Safety guarantee system | |
CN114418263A (en) | A defense system for power monitoring device of thermal power plant | |
CN111914300A (en) | Document encryption device and method for preventing file leakage | |
Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
CN108521431A (en) | A kind of information security of computer network system | |
CN112235243A (en) | Log audit security platform based on Web application security | |
CN111600890A (en) | Network security perception system based on big data | |
Manral et al. | Establishing forensics capabilities in the presence of superuser insider threats | |
Liu | Discussion and Practice of Computer Network Information and Network Security Protection Strategy | |
Lei et al. | Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. | |
CN112261017A (en) | Server abnormal behavior monitoring and management method oriented to cloud computing environment | |
CN112131576A (en) | Safety protection system for power plant database | |
Yang et al. | Analysis of Computer Network Security and Prevention Technology | |
Teymourlouei et al. | Detecting and preventing information security breaches | |
Rani | A Perspective for Intrusion Detection & Prevention in Cloud Environment | |
Wang et al. | Research on the information security technology of university campus network | |
Sun et al. | Research on the design of the implementation plan of network security level protection of information security | |
Gu et al. | Optimization Strategy of Computer Network Security Technology in Big Data Environment | |
Li et al. | The Application of the Key Technology and Security Model in University Ideological and Political Network | |
Wang | Identification of Factors Influencing Enterprise Data Security Risks under the Background of Digital Transformation | |
Sun et al. | Research on Security Evaluation Technology of Intelligent Video Terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Han Shihai Inventor after: Lei Juan Inventor after: Xu Xin Inventor after: Zhang Wei Inventor after: Li Yang Inventor after: Xu Leiyang Inventor after: Zhang Yi Inventor after: Yu Jian Inventor after: Jing Yuwen Inventor after: Zhu Zhu Inventor after: Liang Hua Inventor after: Gao Shuang Inventor after: Li Wei Inventor after: Zhang Sen Inventor after: Yan Yao Inventor after: Wan Lingyun Inventor before: Han Shihai Inventor before: Lei Juan Inventor before: Xu Xin Inventor before: Zhang Wei Inventor before: Li Yang Inventor before: Xu Leiyang Inventor before: Zhang Yi Inventor before: Yu Jian Inventor before: Jing Yuwen Inventor before: Zhu Zhu Inventor before: Liang Hua Inventor before: Gao Shuang Inventor before: Li Wei Inventor before: Zhang Sen Inventor before: Yan Yao Inventor before: Wang Lingyun |