CN115333796A - 基于智能感知物联网终端安全状态信息的监测方法及系统 - Google Patents
基于智能感知物联网终端安全状态信息的监测方法及系统 Download PDFInfo
- Publication number
- CN115333796A CN115333796A CN202210886316.XA CN202210886316A CN115333796A CN 115333796 A CN115333796 A CN 115333796A CN 202210886316 A CN202210886316 A CN 202210886316A CN 115333796 A CN115333796 A CN 115333796A
- Authority
- CN
- China
- Prior art keywords
- state information
- internet
- safety
- terminal
- things
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000012544 monitoring process Methods 0.000 title claims abstract description 53
- 238000004458 analytical method Methods 0.000 claims abstract description 40
- 230000008569 process Effects 0.000 claims abstract description 39
- 230000006399 behavior Effects 0.000 claims abstract description 28
- 238000011156 evaluation Methods 0.000 claims abstract description 20
- 238000004590 computer program Methods 0.000 claims description 11
- 230000008447 perception Effects 0.000 claims description 11
- 239000011159 matrix material Substances 0.000 claims description 9
- 238000005070 sampling Methods 0.000 claims description 9
- 230000006870 function Effects 0.000 claims description 6
- 230000007704 transition Effects 0.000 claims description 6
- 230000002155 anti-virotic effect Effects 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- 238000003860 storage Methods 0.000 claims description 3
- 238000012549 training Methods 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims 2
- 230000008260 defense mechanism Effects 0.000 abstract description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000739 chaotic effect Effects 0.000 description 2
- 230000001066 destructive effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000035515 penetration Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
- G16Y30/10—Security thereof
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210886316.XA CN115333796B (zh) | 2022-07-26 | 2022-07-26 | 基于智能感知物联网终端安全状态信息的监测方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210886316.XA CN115333796B (zh) | 2022-07-26 | 2022-07-26 | 基于智能感知物联网终端安全状态信息的监测方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115333796A true CN115333796A (zh) | 2022-11-11 |
CN115333796B CN115333796B (zh) | 2024-08-06 |
Family
ID=83919901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210886316.XA Active CN115333796B (zh) | 2022-07-26 | 2022-07-26 | 基于智能感知物联网终端安全状态信息的监测方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115333796B (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117857603A (zh) * | 2024-03-05 | 2024-04-09 | 四川大学 | 一种森林物联网终端物理安全状态的监控方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190260781A1 (en) * | 2018-02-20 | 2019-08-22 | Darktrace Limited | A cyber security appliance for an operational technology network |
CN110380896A (zh) * | 2019-07-04 | 2019-10-25 | 湖北央中巨石信息技术有限公司 | 基于攻击图的网络安全态势感知模型和方法 |
CN111131338A (zh) * | 2020-04-01 | 2020-05-08 | 深圳市云盾科技有限公司 | 感知态势处物联网安全检测方法、系统及存储介质 |
US10673880B1 (en) * | 2016-09-26 | 2020-06-02 | Splunk Inc. | Anomaly detection to identify security threats |
-
2022
- 2022-07-26 CN CN202210886316.XA patent/CN115333796B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10673880B1 (en) * | 2016-09-26 | 2020-06-02 | Splunk Inc. | Anomaly detection to identify security threats |
US20190260781A1 (en) * | 2018-02-20 | 2019-08-22 | Darktrace Limited | A cyber security appliance for an operational technology network |
CN110380896A (zh) * | 2019-07-04 | 2019-10-25 | 湖北央中巨石信息技术有限公司 | 基于攻击图的网络安全态势感知模型和方法 |
CN111131338A (zh) * | 2020-04-01 | 2020-05-08 | 深圳市云盾科技有限公司 | 感知态势处物联网安全检测方法、系统及存储介质 |
Non-Patent Citations (1)
Title |
---|
李世斌;李婧;唐刚;李艺;: "基于HMM的工业控制系统网络安全状态预测与风险评估方法", 信息网络安全, no. 09, 10 September 2020 (2020-09-10) * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117857603A (zh) * | 2024-03-05 | 2024-04-09 | 四川大学 | 一种森林物联网终端物理安全状态的监控方法 |
CN117857603B (zh) * | 2024-03-05 | 2024-05-31 | 四川大学 | 一种森林物联网终端物理安全状态的监控方法 |
Also Published As
Publication number | Publication date |
---|---|
CN115333796B (zh) | 2024-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Manoharan et al. | Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection | |
Park et al. | An enhanced AI-based network intrusion detection system using generative adversarial networks | |
US20220210200A1 (en) | Ai-driven defensive cybersecurity strategy analysis and recommendation system | |
US20230011004A1 (en) | Cyber security sandbox environment | |
US20180288084A1 (en) | Method and device for automatically establishing intrusion detection model based on industrial control network | |
CN111368302B (zh) | 基于攻击者攻击策略生成的自动威胁检测方法 | |
CN113381980B (zh) | 信息安全防御方法及系统、电子设备、存储介质 | |
Canonico et al. | Industrial cyber-physical systems protection: A methodological review | |
Marchetti et al. | Identification of correlated network intrusion alerts | |
Toker et al. | Mitre ics attack simulation and detection on ethercat based drinking water system | |
CN115333796B (zh) | 基于智能感知物联网终端安全状态信息的监测方法及系统 | |
CN116032602A (zh) | 一种自动识别威胁数据的方法、装置、设备及存储介质 | |
CN118381627A (zh) | 一种llm驱动的工业网络入侵检测方法和响应系统 | |
Shanthi et al. | A New Era of Cybersecurity: The Influence of Artificial Intelligence | |
CN118157961A (zh) | 主动模拟入侵评估与全链路可视化防护系统、方法及设备 | |
CN116668054A (zh) | 一种安全事件协同监测预警方法、系统、设备及介质 | |
Cheng et al. | Protecting VNF services with smart online behavior anomaly detection method | |
CN115361177B (zh) | 一种基于智能响应式威胁感知和动态网络变换技术的主动防御系统 | |
CN115296902B (zh) | 一种虚拟信息的网络伪装方法 | |
CN118101337B (zh) | 一种基于情报协同的铁路网络空间智能防御方法及系统 | |
Zheng et al. | Research on Network Security Threat Analysis Technology Based on Ontology. | |
Kaziev et al. | Business Infrastructure Resilience to IT Infrastructure Risks and Its Modeling | |
CN118171271B (zh) | 一种数据库的安全监测方法、系统及终端 | |
Luo et al. | A HMM-Based ICS Adaptive Deception Defense Framework | |
Wang et al. | A Practical Intrusion Visualization Analyzer based on Self-organizing Map |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Guo Yue Inventor after: Ke Wangsong Inventor after: Li Lei Inventor after: Li Xiang Inventor after: Wang Botao Inventor after: Deng Guoru Inventor after: Liang Yuan Inventor after: Zhuang Yan Inventor after: Liao Rongtao Inventor after: Dong Liang Inventor after: Liu Fen Inventor after: Wang Yixi Inventor after: Xu Jie Inventor after: Luo Xian Inventor before: Guo Yue Inventor before: Ke Wangsong Inventor before: Li Lei Inventor before: Li Xiang Inventor before: Wang Botao Inventor before: Liang Yuan Inventor before: Zhuang Yan Inventor before: Liao Rongtao Inventor before: Dong Liang Inventor before: Liu Fen Inventor before: Wang Yixi Inventor before: Xu Jie Inventor before: Luo Xian |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |