CN113709089A - System and method for filtering illegal data through Internet of things - Google Patents
System and method for filtering illegal data through Internet of things Download PDFInfo
- Publication number
- CN113709089A CN113709089A CN202010916919.0A CN202010916919A CN113709089A CN 113709089 A CN113709089 A CN 113709089A CN 202010916919 A CN202010916919 A CN 202010916919A CN 113709089 A CN113709089 A CN 113709089A
- Authority
- CN
- China
- Prior art keywords
- data
- dynamic code
- module
- unique dynamic
- illegal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001914 filtration Methods 0.000 title claims abstract description 48
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000001514 detection method Methods 0.000 claims abstract description 27
- 238000012545 processing Methods 0.000 claims abstract description 24
- 238000006243 chemical reaction Methods 0.000 claims abstract description 17
- 238000004891 communication Methods 0.000 claims description 7
- 238000005516 engineering process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an illegal data filtering system and method for the Internet of things, and the system comprises a server, a data receiving module, a data conversion module, a data processing module and a data display module, wherein the server is used for generating and sending a unique dynamic code, the data receiving module is used for receiving the unique dynamic code, the data conversion module is used for converting the unique dynamic code into the unique dynamic code for being detected by a data processing terminal, the data processing terminal comprises a data detection module, a data comparison module, a data filtering module and a data interception module, the data detection module is used for carrying out data detection on the unique dynamic code to obtain a detected data result which is the unique dynamic code m, and the data comparison module is used for comparing the unique dynamic code m with a preset unique dynamic code m generated by the system1Carrying out comparison; the invention can greatly improve the safety of the system data and ensure the safe input and output of the data.
Description
Technical Field
The invention relates to the technical field of illegal data filtering, in particular to an illegal data filtering system and method of the Internet of things.
Background
The internet of things means that any object or process needing monitoring, connection and interaction is collected in real time through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors, laser scanners and the like, various required information such as sound, light, heat, electricity, mechanics, positions and the like is collected, ubiquitous connection of objects and objects, and ubiquitous connection of objects and people are realized through various possible network accesses, and intelligent sensing, identification and management of the objects and the process are realized; the network security refers to that hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and for the system to continuously operate, data input and output by the system must be filtered in real time, and illegal data must be intercepted, so that the system and the method for filtering the illegal data are needed.
The existing illegal data filtering system cannot carry out the unique dynamic code m and the preset unique dynamic code m generated by the system in the using process1And comparing, so that the input and output data cannot be filtered, and meanwhile, illegal data cannot be intercepted. Therefore, a system and a method for filtering illegal data by the Internet of things are provided.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to solve the problem that the existing illegal data filtering system cannot carry out the unique dynamic code m and the preset unique dynamic code m generated by the system in the using process1And comparing, so that the input and output data cannot be filtered, and meanwhile, illegal data cannot be intercepted, thereby providing the system and the method for filtering the illegal data by the Internet of things.
The invention solves the technical problem through the following technical scheme, and the system for filtering illegal data by the Internet of things comprises a server, a data receiving module, a data conversion module, a data processing module and a data display module, wherein,
the server is used for generating and sending the unique dynamic code, the data receiving module is used for receiving the unique dynamic code, and the data conversion module is used for converting the unique dynamic code into the unique dynamic code for the data processing terminal to detect.
As a further scheme of the invention: the data processing terminal comprises a data detection module, a data comparison module, a data filtering module and a data interception module, wherein the data detection module is used for carrying out data detection on the unique dynamic code, the obtained detection data result is the unique dynamic code m, and the data detection module is used for detecting the unique dynamic code mThe data comparison module is used for comparing the unique dynamic code m with a preset unique dynamic code m generated by the system1Carrying out comparison;
wherein, the data comparison module compares the unique dynamic code m with a preset unique dynamic code m generated by the system1The results of the comparison were as follows:
s1, when the unique dynamic code m and the unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
s2, when the unique dynamic code m and the unique dynamic code m1If the similarity is more than 5%, the illegal dynamic coding is judged.
As a further scheme of the invention: the data filtering module is used for filtering the illegal dynamic codes and transmitting the illegal dynamic codes to the data intercepting module, and the data intercepting module is used for intercepting the filtered illegal dynamic codes;
the data display module is used for displaying the data of the normal dynamic codes and displaying the intercepted illegal dynamic code results.
As a further scheme of the invention: the server, the data receiving module, the data conversion module, the data processing module and the data display module are all in communication connection through the Internet of things.
As a further scheme of the invention: the server is used for generating the unique dynamic code in a mode of receiving the content firstly, then converting the content into a byte array, coding the parameter to be received firstly and then receiving one of the parameters.
A filtering method of an Internet of things illegal data filtering system comprises the following specific steps:
s1, the communication connection among the server, the data receiving module, the data conversion module, the data processing module and the data display module is realized by utilizing the Internet of things;
s2, receiving the unique dynamic code generated by the server by using the data receiving module, and converting the unique dynamic code into the unique dynamic code for the detection of the data processing terminal to obtain a unique dynamic code m;
s3, detection by dataThe module carries out data detection on the unique dynamic code, and the unique dynamic code m and a preset unique dynamic code m generated by the system are compared through the data comparison module1In comparison, the rule for determining whether the unique dynamic code m is illegal data is as follows:
SS1, unique dynamic code m and unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
SS2, unique dynamic code m and unique dynamic code m1If the similarity is more than 5%, judging the code to be illegal dynamic code;
and S4, filtering the illegal dynamic codes by using the data filtering module, and intercepting the filtered illegal dynamic codes by using the data intercepting module.
Compared with the prior art, the invention has the following advantages: when the illegal data filtering system and the illegal data filtering method are used, the unique dynamic code m and the preset unique dynamic code m generated by the system are compared through the data comparison module1And comparing to judge whether the unique dynamic code m is illegal data, wherein the judgment rule is as follows: when the unique dynamic code m and the unique dynamic code m1If the similarity is less than or equal to 5%, judging as a regular dynamic code, and when the unique dynamic code m and the unique dynamic code m are in the same order1If the similarity is more than 5%, the system judges that the system is illegal dynamic coding, then the illegal dynamic coding is filtered through the data filtering module, and then the filtered illegal dynamic coding is intercepted through the data intercepting module, so that the safety of the system data can be greatly improved, and the safe input and output of the data are ensured.
Drawings
FIG. 1 is a system block diagram of the present invention.
Detailed Description
The following examples are given for the detailed implementation and specific operation of the present invention, but the scope of the present invention is not limited to the following examples.
Example 1
As shown in fig. 1, the present embodiment provides a technical solution: an Internet of things illegal data filtering system comprises a server, a data receiving module, a data conversion module, a data processing module and a data display module, wherein,
the server is used for generating and sending the unique dynamic code, the data receiving module is used for receiving the unique dynamic code, and the data conversion module is used for converting the unique dynamic code into the unique dynamic code for the data processing terminal to detect.
The data processing terminal comprises a data detection module, a data comparison module, a data filtering module and a data interception module, wherein the data detection module is used for carrying out data detection on the unique dynamic code to obtain a detection data result which is the unique dynamic code m, and the data comparison module is used for comparing the unique dynamic code m with a preset unique dynamic code m generated by the system1Carrying out comparison;
wherein, the data comparison module compares the unique dynamic code m with a preset unique dynamic code m generated by the system1The results of the comparison were as follows:
s1, when the unique dynamic code m and the unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
s2, when the unique dynamic code m and the unique dynamic code m1If the similarity is more than 5%, the illegal dynamic coding is judged.
The data filtering module is used for filtering the illegal dynamic codes and transmitting the illegal dynamic codes to the data intercepting module, and the data intercepting module is used for intercepting the filtered illegal dynamic codes;
the data display module is used for displaying the data of the normal dynamic codes and displaying the intercepted illegal dynamic code results.
The server, the data receiving module, the data conversion module, the data processing module and the data display module are all in communication connection through the Internet of things.
The server is used for generating the unique dynamic code by receiving the content firstly, then converting the content into a byte array, coding the parameter to be received firstly and then receiving one of the parameters.
Through the technical scheme: when the system is used, a server is used for generating and sending a unique dynamic code, then a data receiving module receives the unique dynamic code, the unique dynamic code is converted into a unique dynamic code for being detected by a data processing terminal through a data conversion module, then a data detection module is used for carrying out data detection on the unique dynamic code, and a data comparison module is used for comparing the unique dynamic code m with a preset unique dynamic code m generated by the system1Comparing the unique dynamic code m with the unique dynamic code m1If the similarity is less than or equal to 5%, judging as a regular dynamic code, and when the unique dynamic code m and the unique dynamic code m are in the same order1If the similarity is more than 5%, judging that the system is illegal dynamic codes, finally filtering the illegal dynamic codes by using the data filtering module, and intercepting the filtered illegal dynamic codes by using the data intercepting module, thereby greatly improving the safety of the system data and ensuring the safe input and output of the data.
Example 2
A filtering method of an Internet of things illegal data filtering system comprises the following specific steps:
s1, the communication connection among the server, the data receiving module, the data conversion module, the data processing module and the data display module is realized by utilizing the Internet of things;
s2, receiving the unique dynamic code generated by the server by using the data receiving module, and converting the unique dynamic code into the unique dynamic code for the detection of the data processing terminal to obtain a unique dynamic code m;
s3, detecting the unique dynamic code by using the data detection module, and comparing the unique dynamic code m with the preset unique dynamic code m generated by the system by using the data comparison module1In comparison, the rule for determining whether the unique dynamic code m is illegal data is as follows:
SS1, unique dynamic code m and unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
SS2, unique dynamic code m and unique dynamic code m1Is more than 5%, then is judged to be notDynamic coding;
and S4, filtering the illegal dynamic codes by using the data filtering module, and intercepting the filtered illegal dynamic codes by using the data intercepting module.
Through the technical scheme: when the illegal data filtering system is used, the unique dynamic code m and the preset unique dynamic code m generated by the system are compared through the data comparison module1And comparing to judge whether the unique dynamic code m is illegal data, wherein the judgment rule is as follows: when the unique dynamic code m and the unique dynamic code m1If the similarity is less than or equal to 5%, judging as a regular dynamic code, and when the unique dynamic code m and the unique dynamic code m are in the same order1If the similarity is more than 5%, the system judges that the system is illegal dynamic coding, then the illegal dynamic coding is filtered through the data filtering module, and then the filtered illegal dynamic coding is intercepted through the data intercepting module, so that the safety of the system data can be greatly improved, and the safe input and output of the data are ensured.
To sum up, in the system and method for filtering illegal data of the embodiment, firstly, the communication connection between the server, the data receiving module, the data conversion module, the data processing module and the data display module is realized through the internet of things, when the system is used, the server is used for generating and sending the unique dynamic code, then the data receiving module receives the unique dynamic code, the data conversion module converts the unique dynamic code into the unique dynamic code for the detection of the data processing terminal, then the data detection module is used for detecting the data of the unique dynamic code, and the data comparison module is used for comparing the unique dynamic code m with the preset unique dynamic code m generated by the system1Comparing the unique dynamic code m with the unique dynamic code m1If the similarity is less than or equal to 5%, judging as a regular dynamic code, and when the unique dynamic code m and the unique dynamic code m are in the same order1If the similarity is more than 5 percent, the system judges that the system is illegal dynamic code, finally filters the illegal dynamic code by using the data filtering module, and then intercepts the filtered illegal dynamic code by using the data intercepting module, thereby greatly improving the safety of the system data and ensuring the safety of the system dataAnd safe input and output of data.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (6)
1. An Internet of things illegal data filtering system is characterized by comprising a server, a data receiving module, a data conversion module, a data processing module and a data display module, wherein,
the server is used for generating and sending the unique dynamic code, the data receiving module is used for receiving the unique dynamic code, and the data conversion module is used for converting the unique dynamic code into the unique dynamic code for the data processing terminal to detect.
2. The internet of things illegal data filtering system according to claim 1, characterized in that: the data processing terminal comprises a data detection module, a data comparison module, a data filtering module and a data interception module, wherein the data detection module is used for carrying out data detection on the unique dynamic code, the obtained detection data result is the unique dynamic code m, and the data comparison module is used for comparing the unique dynamic code m with a preset unique dynamic code m generated by the system1Carrying out comparison;
wherein, the data comparison module compares the unique dynamic code m with a preset unique dynamic code m generated by the system1The results of the comparison were as follows:
s1, when the unique dynamic code m and the unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
s2, when the unique dynamic code m and the unique dynamic code m1If the similarity is more than 5%, the illegal dynamic coding is judged.
3. The internet of things illegal data filtering system according to claim 2, characterized in that: the data filtering module is used for filtering the illegal dynamic codes and transmitting the illegal dynamic codes to the data intercepting module, and the data intercepting module is used for intercepting the filtered illegal dynamic codes;
the data display module is used for displaying the data of the normal dynamic codes and displaying the intercepted illegal dynamic code results.
4. The filtering method for the internet of things illegal data filtering system according to claim 1, wherein the method comprises the following steps: the server, the data receiving module, the data conversion module, the data processing module and the data display module are all in communication connection through the Internet of things.
5. The internet of things illegal data filtering system according to claim 1, characterized in that: the server is used for generating the unique dynamic code in a mode of receiving the content firstly, then converting the content into a byte array, coding the parameter to be received firstly and then receiving one of the parameters.
6. A method for filtering illegal data by using the internet of things of claim 1, characterized in that: the method comprises the following specific steps:
s1, the communication connection among the server, the data receiving module, the data conversion module, the data processing module and the data display module is realized by utilizing the Internet of things;
s2, receiving the unique dynamic code generated by the server by using the data receiving module, and converting the unique dynamic code into the unique dynamic code for the detection of the data processing terminal to obtain a unique dynamic code m;
s3, detecting the unique dynamic code by using the data detection module, and comparing the unique dynamic code m with the preset unique dynamic code m generated by the system by using the data comparison module1In comparison, the rule for determining whether the unique dynamic code m is illegal data is as follows:
SS1, unique dynamic code m and unique dynamic code m1If the similarity is less than or equal to 5%, judging the code to be normal dynamic code;
SS2, unique dynamic code m and unique dynamic code m1If the similarity is more than 5%, judging the code to be illegal dynamic code;
and S4, filtering the illegal dynamic codes by using the data filtering module, and intercepting the filtered illegal dynamic codes by using the data intercepting module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010916919.0A CN113709089A (en) | 2020-09-03 | 2020-09-03 | System and method for filtering illegal data through Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010916919.0A CN113709089A (en) | 2020-09-03 | 2020-09-03 | System and method for filtering illegal data through Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113709089A true CN113709089A (en) | 2021-11-26 |
Family
ID=78646632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010916919.0A Pending CN113709089A (en) | 2020-09-03 | 2020-09-03 | System and method for filtering illegal data through Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113709089A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014011591A (en) * | 2012-06-28 | 2014-01-20 | Toshiba Corp | Transmission device, transmission system, and self-diagnostic method thereof |
CN108718296A (en) * | 2018-04-27 | 2018-10-30 | 广州西麦科技股份有限公司 | Network management-control method, device and computer readable storage medium based on SDN network |
CN109120699A (en) * | 2018-08-21 | 2019-01-01 | 山推工程机械股份有限公司 | Long-distance monitoring method, device, equipment and the storage medium of engineering machinery emission |
US20190036952A1 (en) * | 2017-07-28 | 2019-01-31 | Penta Security Systems Inc. | Method and apparatus for detecting anomaly traffic |
CN109639739A (en) * | 2019-01-30 | 2019-04-16 | 大连理工大学 | A kind of anomalous traffic detection method based on autocoder network |
CN111030992A (en) * | 2019-11-08 | 2020-04-17 | 厦门网宿有限公司 | Detection method, server and computer readable storage medium |
CN111027058A (en) * | 2019-11-12 | 2020-04-17 | 深圳供电局有限公司 | Method for detecting data attack in power system, computer equipment and storage medium |
CN111104241A (en) * | 2019-11-29 | 2020-05-05 | 苏州浪潮智能科技有限公司 | Server memory anomaly detection method, system and equipment based on self-encoder |
CN111241524A (en) * | 2020-01-18 | 2020-06-05 | 苏州浪潮智能科技有限公司 | Method and system for judging uniqueness of equipment |
-
2020
- 2020-09-03 CN CN202010916919.0A patent/CN113709089A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014011591A (en) * | 2012-06-28 | 2014-01-20 | Toshiba Corp | Transmission device, transmission system, and self-diagnostic method thereof |
US20190036952A1 (en) * | 2017-07-28 | 2019-01-31 | Penta Security Systems Inc. | Method and apparatus for detecting anomaly traffic |
CN108718296A (en) * | 2018-04-27 | 2018-10-30 | 广州西麦科技股份有限公司 | Network management-control method, device and computer readable storage medium based on SDN network |
CN109120699A (en) * | 2018-08-21 | 2019-01-01 | 山推工程机械股份有限公司 | Long-distance monitoring method, device, equipment and the storage medium of engineering machinery emission |
CN109639739A (en) * | 2019-01-30 | 2019-04-16 | 大连理工大学 | A kind of anomalous traffic detection method based on autocoder network |
CN111030992A (en) * | 2019-11-08 | 2020-04-17 | 厦门网宿有限公司 | Detection method, server and computer readable storage medium |
CN111027058A (en) * | 2019-11-12 | 2020-04-17 | 深圳供电局有限公司 | Method for detecting data attack in power system, computer equipment and storage medium |
CN111104241A (en) * | 2019-11-29 | 2020-05-05 | 苏州浪潮智能科技有限公司 | Server memory anomaly detection method, system and equipment based on self-encoder |
CN111241524A (en) * | 2020-01-18 | 2020-06-05 | 苏州浪潮智能科技有限公司 | Method and system for judging uniqueness of equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102647421B (en) | The web back door detection method of Behavior-based control feature and device | |
CN102449635B (en) | Cloud computing as a security layer | |
EP1741223B1 (en) | Method, apparatus and computer program for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis | |
CN109347823B (en) | CAN bus abnormality detection method based on information entropy | |
CN111274583A (en) | Big data computer network safety protection device and control method thereof | |
KR102225460B1 (en) | Method of detecting threat based on threat hunting using multi sensor data and apparatus using the same | |
CN108931968B (en) | Network security protection system applied to industrial control system and protection method thereof | |
US20070058598A1 (en) | Method and system for detecting rogue access points and device for identifying rogue access points | |
CN112953971A (en) | Network security traffic intrusion detection method and system | |
CN111556473A (en) | Abnormal access behavior detection method and device | |
KR20120068611A (en) | Apparatus and method for security situation awareness and situation information generation based on spatial linkage of physical and it security | |
CN112685682A (en) | Method, device, equipment and medium for identifying forbidden object of attack event | |
CN111709034A (en) | Machine learning-based industrial control environment intelligent safety detection system and method | |
CN110830441A (en) | Information safety monitoring system based on big data | |
Abdulrahaman Okino Otuoze et al. | Electricity theft detection framework based on universal prediction algorithm | |
CN111212055A (en) | Non-invasive website remote detection system and detection method | |
US10847001B2 (en) | Systems to detect the presence of intruder devices in a home environment | |
CN109729084B (en) | Network security event detection method based on block chain technology | |
CN113709089A (en) | System and method for filtering illegal data through Internet of things | |
CN110674499A (en) | Method, device and storage medium for identifying computer threat | |
EP2911362B1 (en) | Method and system for detecting intrusion in networks and systems based on business-process specification | |
CN112887288B (en) | Internet-based E-commerce platform intrusion detection front-end computer scanning system | |
Jeong et al. | Accurate and communication-efficient detection of widespread events | |
CN112948831B (en) | Application risk identification method and device | |
CN115118481A (en) | Host information acquisition method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211126 |