CN117527860A - Internet of things communication method, system and medium based on distributed system - Google Patents

Internet of things communication method, system and medium based on distributed system Download PDF

Info

Publication number
CN117527860A
CN117527860A CN202410016036.2A CN202410016036A CN117527860A CN 117527860 A CN117527860 A CN 117527860A CN 202410016036 A CN202410016036 A CN 202410016036A CN 117527860 A CN117527860 A CN 117527860A
Authority
CN
China
Prior art keywords
data
transmission
user
database
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410016036.2A
Other languages
Chinese (zh)
Other versions
CN117527860B (en
Inventor
侯瑞锋
贾士礼
侯利明
张志亮
刘娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Plant Biotechnology Co ltd
Original Assignee
Hebei Plant Biotechnology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Plant Biotechnology Co ltd filed Critical Hebei Plant Biotechnology Co ltd
Priority to CN202410016036.2A priority Critical patent/CN117527860B/en
Publication of CN117527860A publication Critical patent/CN117527860A/en
Application granted granted Critical
Publication of CN117527860B publication Critical patent/CN117527860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/20Analytics; Diagnosis
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The application relates to the technical field of internet of things communication, in particular to an internet of things communication method, system and medium based on a distributed system, wherein the method comprises the following steps: based on a preset agreement, acquiring real-time detection data and equipment data, binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, respectively storing the equipment data and the log storage data into a first database and a second database, analyzing the data request instruction after receiving the data request instruction sent by a user client, obtaining a read data requirement corresponding to the data request instruction, calling the equipment data and the log storage data corresponding to the first database and the second database based on the read data requirement, and sending the real-time detection data and the log history data to the user client. The method and the device improve the drawing efficiency of the user on the real-time running condition of the equipment.

Description

Internet of things communication method, system and medium based on distributed system
Technical Field
The application relates to the technical field of internet of things communication, in particular to an internet of things communication method, system and medium based on a distributed system.
Background
Distributed systems refer to splitting a system into different services, each of which is responsible for performing a particular function, so that a large system can be split into multiple small, independent services. This helps to decouple the system and allows each service to be extended and upgraded independently. The internet of things refers to connecting any object with a network through information sensing equipment according to a stipulated protocol, and carrying out information exchange and communication on the object through an information transmission medium so as to realize functions of intelligent identification, supervision and the like.
At present, the existing implementation mode of the internet of things is only applied to the internet of things equipment of respective systems. And the method is not applicable to other systems or self-developed internet of things equipment. Therefore, when a user acquires other systems or self-developed Internet of things equipment, the user needs to manually acquire the equipment in the field, so that the drawing efficiency of the user on the real-time running condition of the equipment is reduced.
Disclosure of Invention
In order to solve at least one technical problem, the application provides an internet of things communication method, system and medium based on a distributed system.
In a first aspect, the present application provides a communication method of the internet of things based on a distributed system, which adopts the following technical scheme:
Acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of different equipment when uploading the real-time detection data and acquiring the equipment data, and the equipment data are configuration data of the equipment;
binding the preset agreement and the real-time detection data according to a time node to obtain log storage data;
respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
after receiving a data request instruction sent by a user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction;
and calling corresponding device data and log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
In one possible implementation manner, the sending the device data and log storage data to the user client further includes:
after receiving a data configuration instruction sent by a user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction;
adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
and generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
In one possible implementation manner, after receiving the data request instruction sent by the user client, the method further includes:
when the user client is monitored to establish connection through a communication protocol, acquiring flow transmission information of the user client in real time;
the traffic transmission information is arranged according to the transmission time node, and a transmission wave diagram of the user client for data transmission is obtained;
Fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are abnormal, if so, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of different types of user clients in data communication;
and comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In one possible implementation manner, performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an abnormal access degree of the user client, including:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
Obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
In one possible implementation manner, the performing exception analysis on each change value corresponding to each transmission data segment according to the data security condition that each change value corresponding to each transmission data segment occurs in a future preset time to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models includes:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
In a second aspect, the present application provides a communication method of the internet of things based on a distributed system, which adopts the following technical scheme:
acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to a device communication end, so that the device communication end calls corresponding device data and log storage data in a first database and a second database based on the data request instruction;
And receiving the device data transmitted by the device communication terminal and the log storage data.
In one possible implementation manner, the receiving the device data and the log storage data that are sent by the device communication end transmission further includes:
when a user configuration requirement is detected, determining configuration adjustment data according to the user configuration requirement, the equipment data and log storage data;
generating a data configuration instruction according to the configuration adjustment data, and sending the data configuration instruction to the equipment communication terminal.
In a third aspect, the present application provides an internet of things communication system based on a distributed system, which adopts the following technical scheme:
an internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the different sensors when uploading the real-time detection data and acquiring the equipment data;
the data binding module is used for binding the preset agreement protocol and the real-time detection data according to a time node to obtain log storage data;
The data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client, so as to obtain a read data requirement corresponding to the data request instruction;
and the data return module is used for calling the corresponding device data and log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
In one possible implementation, the system further includes: a configuration analysis module, a configuration updating module and a device adjusting module, wherein,
the configuration analysis module is used for analyzing the data configuration instruction after receiving the data configuration instruction sent by the user client to obtain data configuration information corresponding to the data configuration instruction;
The configuration updating module is used for adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
the device adjusting module is used for generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
In another possible implementation, the method further includes: the system comprises a flow acquisition module, an information arrangement module, an abnormality monitoring module and a trust degree adjustment module, wherein,
the flow acquisition module is used for acquiring flow transmission information of the user client in real time when monitoring that the user client establishes connection through a communication protocol;
the information arrangement module is used for arranging the flow transmission information according to the transmission time node to obtain a transmission wave diagram of the user client for data transmission;
the anomaly monitoring module is used for fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are anomalous or not, acquiring historical flow transmission data if the flow transmission data are anomalous, carrying out data transmission anomaly analysis on the user client based on the historical flow transmission data to obtain the anomaly access degree of the user client, wherein the historical flow transmission data are flow transmission data of the user client with different types when carrying out data communication;
The trust degree adjusting module is used for comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In another possible implementation manner, the anomaly monitoring module is specifically configured to, when performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
Segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
In another possible implementation manner, the anomaly monitoring module performs anomaly analysis on each change value corresponding to each transmission data segment according to a data security condition that each change value corresponding to each transmission data segment occurs in a future preset time, so as to obtain anomaly degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models, wherein the anomaly monitoring module is specifically configured to:
Respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
In a fourth aspect, the present application provides an internet of things communication system based on a distributed system, which adopts the following technical scheme:
an internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end;
and the data receiving module is used for receiving the equipment data transmitted by the equipment communication terminal and the log storage data.
In one possible implementation, the system further includes: the configuration determining module and the instruction sending module, wherein,
the configuration determining module is used for determining configuration adjustment data according to the user configuration requirement, the equipment data and the log storage data when the user configuration requirement is detected;
the instruction sending module is used for generating a data configuration instruction according to the configuration adjustment data and sending the data configuration instruction to the equipment communication end.
In a fifth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the distributed system based internet of things communication method according to any of the first or second aspects.
In summary, the present application includes at least one of the following beneficial technical effects:
when a user requests to access equipment data corresponding to different equipment, acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting the different equipment in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of the different equipment when uploading the real-time detection data and acquiring the equipment data, the preset agreement and the real-time detection data are bound according to a time node to obtain log storage data, the equipment data and the log storage data are respectively stored in a first database and a second database, the first database is a database for storing the equipment data, the second database is a database for storing the log storage data in preset time, then after a data request instruction sent by a user client is received, the data request instruction is analyzed to obtain read data requirements corresponding to the data request instruction, the equipment data and the log storage data corresponding to the equipment data in the first database and the second database are called based on the read data requirements, the equipment data and the log storage data are sent to a user client, and the user client can see the real-time running condition of the equipment corresponding to the user client through the user client.
Drawings
Fig. 1 is a schematic flow chart of a communication method of the internet of things based on a distributed system according to an embodiment of the present application.
Fig. 2 is a second flow diagram of an internet of things communication method based on a distributed system according to an embodiment of the present application.
Fig. 3 is a third flow diagram of an internet of things communication method based on a distributed system according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below in conjunction with figures 1-3.
The present embodiment is merely illustrative of the present application and is not intended to be limiting, and those skilled in the art, after having read the present specification, may make modifications to the present embodiment without creative contribution as required, but is protected by patent laws within the scope of the present application.
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the present application are described in further detail below with reference to the drawings attached hereto.
The embodiment of the application discloses an Internet of things communication method based on a distributed system based on a device communication end side.
Referring to fig. 1, an internet of things communication method based on a distributed system is applied to a device communication end, and includes:
and step S10, acquiring real-time detection data and equipment data based on a preset agreement protocol.
The real-time detection data are data obtained by detecting different devices in real time by the sensor, the preset agreement protocol is a communication protocol corresponding to the different sensors of the different devices when uploading the real-time detection data and acquiring the device data, and the device data are configuration data of the device.
And S11, binding a preset appointment protocol and the real-time detection data according to a time node to obtain log storage data.
Step S12, respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in a preset time.
And S13, after receiving a data request instruction sent by the user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction.
And step S14, calling the corresponding device data and the log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
Based on the above embodiment, when a user requests to access device data corresponding to different devices, real-time detection data and device data are acquired based on a preset agreement, wherein the real-time detection data are data obtained by detecting the different devices in real time by a sensor, the preset agreement is a communication protocol corresponding to the different sensors of the different devices when uploading the real-time detection data and acquiring the device data, then the preset agreement and the real-time detection data are bound according to a time node to obtain log storage data, then the device data and the log storage data are respectively stored in a first database and a second database, the first database is a database for storing the device data, the second database is a database for storing the log storage data in preset time, then after receiving a data request instruction sent by a user client, the data request instruction is analyzed, a read data requirement corresponding to the data request instruction is obtained, the device data and the log storage data corresponding to the first database and the second database are called based on the read data requirement, and the log storage data are sent to the user client, so that the real-time efficiency of the user can be improved when the user client is looking up the user device corresponding to the user device.
Further, in the embodiment of the present application, the device data and the log storage data are sent to the user client, and then further include: and after receiving the data configuration instruction sent by the user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction, adjusting and configuring real-time data of the storage device in the first database based on the data configuration information, updating log storage data in the second database according to the time node by the configured device data, generating the device configuration instruction based on the configured device data, and adjusting the control device according to the configured device data.
Referring to fig. 2, in the embodiment of the present application, after receiving a data request instruction sent by a user client, the method further includes:
step 201, when monitoring that a user client establishes a connection through a communication protocol, acquiring traffic transmission information of the user client in real time;
step 202, arranging the traffic transmission information according to the transmission time node to obtain a transmission wave diagram of the data transmission of the user client;
step 203, fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, and judging whether the flow transmission data corresponding to the different transmission time nodes are abnormal or not;
If yes, executing step 204, obtaining historical traffic transmission data, and carrying out data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain the anomaly access degree of the user client, wherein the historical traffic transmission data are traffic transmission data of different types of user clients in data communication;
and 205, comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
For the embodiment of the application, a coordinate system is established, wherein an X axis is time information, a Y axis is flow rate information, the time information corresponding to the X axis is distributed in unit time nodes, the unit time nodes are each minute, the flow rate of the flow rate information corresponding to the Y axis in the current time is marked, then the corresponding flow rate marks of each minute are connected to form a flow rate curve of a user client, the curve is a transmission wave diagram of data transmission, a preset flow rate transmission diagram is a flow rate range diagram corresponding to different unit time, and whether the data transmission abnormality exists or not can be known by fitting the transmission wave diagram with the preset flow rate transmission diagram.
Specifically, performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client, including: determining the highest traffic transmission rate and the lowest traffic transmission rate in the data communication process of user clients of different types according to historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission numerator, taking the time used in the data communication process of each time as transmission denominator, obtaining the transmission rate change value of the data communication process of each time according to the ratio of the transmission numerator to the transmission denominator, arranging the transmission rate change values according to time sequence to obtain the transmission sequence of the historical traffic transmission data, obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients of different types in the transmission sequence and the numerical value of each transmission rate, segmenting the transmission sequence according to all division points, obtaining the similarity of the change value sequence corresponding to each two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, obtaining two or more transmission data segments, analyzing each change value corresponding to each transmission data segment according to the data security condition occurring in the future time, obtaining the abnormal data security condition corresponding to each transmission data segment, obtaining the abnormal data transmission sequence corresponding to the abnormal data transmission sequence of different types in the user clients, and obtaining the abnormal data transmission nodes of different abnormal data transmission nodes according to the abnormal data access degree of different types in the data communication process of different user clients.
Further, in this embodiment of the present application, according to a data security condition that each change value corresponding to each transmission data segment occurs in a future preset time, performing exception analysis on each change value corresponding to each transmission data segment, to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of a user client of different models, where the exception degrees include: and respectively acquiring the data security conditions of each change value corresponding to each transmission data segment in a future preset time, judging whether each change value corresponding to each transmission data segment has the data security conditions, and if so, inputting the data security conditions into a traffic transmission abnormal model for identification to obtain the abnormal degrees of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
For the embodiment of the application, the traffic transmission anomaly model is a pre-trained neural network model.
The embodiment of the application also discloses an Internet of things communication system based on the distributed system based on the equipment communication end side.
An internet of things communication system based on a distributed system is applied to a device communication end, and comprises:
The data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors and the acquisition of the equipment data;
the data binding module is used for binding the preset appointment protocol and the real-time detection data according to the time node to obtain log storage data;
the data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in a preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client to obtain a read data requirement corresponding to the data request instruction;
and the data return module is used for calling the corresponding device data and the log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
One possible implementation manner in the embodiments of the present application, the system further includes: a configuration analysis module, a configuration updating module and a device adjusting module, wherein,
the configuration analysis module is used for analyzing the data configuration instruction after receiving the data configuration instruction sent by the user client to obtain data configuration information corresponding to the data configuration instruction;
the configuration updating module is used for adjusting and configuring the real-time data of the storage device in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by the time node;
and the device adjusting module is used for generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
One possible implementation manner in the embodiments of the present application, the system further includes: the system comprises a flow acquisition module, an information arrangement module, an abnormality monitoring module and a trust degree adjustment module, wherein,
the flow acquisition module is used for acquiring flow transmission information of the user client in real time when monitoring that the user client establishes connection through the IPv6 network;
the information arrangement module is used for arranging the flow transmission information according to the transmission time node to obtain a transmission wave diagram of data transmission of the user client;
The abnormality monitoring module is used for fitting the transmission fluctuation graph and the preset flow transmission graph according to the transmission time nodes, judging whether the flow transmission data corresponding to the different transmission time nodes are abnormal or not, if yes, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of the user client with different types in data communication;
the trust degree adjusting module is used for comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
In one possible implementation manner of the embodiment of the present application, when performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an abnormal access degree of the user client, the anomaly monitoring module is specifically configured to:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
Obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged in time sequence to obtain a transmission sequence of historical traffic transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
based on the abnormality degree, an abnormality access degree of the transmission data segment corresponding to the transmission time node where the traffic transmission data abnormality exists at the user client is obtained.
In one possible implementation manner of the embodiment of the present application, when performing anomaly analysis on each change value corresponding to each transmission data segment according to a data security condition that each change value corresponding to each transmission data segment occurs in a preset time in the future, the anomaly monitoring module is specifically configured to:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has a data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
The embodiment of the application also discloses an Internet of things communication method based on the distributed system based on the user client side.
Referring to fig. 3, a communication method of internet of things based on a distributed system is applied to a user client, and includes:
step S301, user request data are obtained, and whether user identity data in the user request data are preset identity data or not is checked;
Step S302, if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to the equipment communication end, so that the equipment communication end can call corresponding equipment data and log storage data in the first database and the second database based on the data request instruction;
for the embodiment of the application, the preset identity data is the identity data pre-stored in the identity database, and in order to prevent data information leakage, whether the current user has the qualification of acquiring data can be known by comparing the user identity data with the preset identity data.
In step S303, the receiving device communication end transmits the transmitted device data and log storage data.
Based on the above embodiment, when a user obtains different device data, the user request data is obtained, then whether the user identity data in the user request data is preset identity data is checked, if the user identity data in the user request data is preset identity data, a data request instruction is generated based on the read data requirement in the user request data, the data request instruction is sent to the device communication end, and the device communication end is received to transmit the sent device data and log storage data. Therefore, the user identity can be checked to ensure the safety of the data, the user can obtain the equipment data corresponding to the equipment and the log storage data in time, and the data acquisition efficiency of the user is improved.
Further, in the embodiment of the present application, the receiving device communication end transmits the sent device data and the log storage data, and then further includes: when the user configuration requirement is detected, configuration adjustment data are determined according to the user configuration requirement, the equipment data and the log storage data, a data configuration instruction is generated according to the configuration adjustment data, and the data configuration instruction is sent to the equipment communication end.
The embodiment of the application also discloses an Internet of things communication system based on the distributed system based on the user client side.
An internet of things communication system based on a distributed system, which is applied to a user client, comprises:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end;
and the data receiving module is used for receiving the device data transmitted by the device communication end and the log storage data.
One possible implementation manner in the embodiments of the present application, the system further includes: the configuration determining module and the instruction sending module, wherein,
The configuration determining module is used for determining configuration adjustment data according to the user configuration requirement, the equipment data and the log storage data when the user configuration requirement is detected;
the instruction sending module is used for generating a data configuration instruction according to the configuration adjustment data and sending the data configuration instruction to the equipment communication terminal.
A computer readable storage medium provided in the embodiments of the present application is described below, and the computer readable storage medium described below and the method described above may be referred to correspondingly.
The embodiment of the application provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the communication method of the internet of things based on a distributed system are realized.
Since embodiments of the computer-readable storage medium portion and embodiments of the method portion correspond to each other, embodiments of the computer-readable storage medium portion are described with reference to embodiments of the method portion.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application and it should be noted that, for a person skilled in the art, several improvements and modifications can be made without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. The Internet of things communication method based on the distributed system is characterized by being applied to a device communication end and comprising the following steps:
acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the uploading of the real-time detection data by different sensors of different equipment and the acquisition of the equipment data;
binding the preset agreement and the real-time detection data according to a time node to obtain log storage data, wherein the equipment data are configuration data of equipment;
respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
After receiving a data request instruction sent by a user client, analyzing the data request instruction to obtain a read data requirement corresponding to the data request instruction;
and calling corresponding device data and log storage data in the first database and the second database based on the read data requirement, and sending the device data and the log storage data to the user client.
2. The internet of things communication method based on a distributed system according to claim 1, wherein the sending the device data and log storage data to the user client further comprises:
after receiving a data configuration instruction sent by a user client, analyzing the data configuration instruction to obtain data configuration information corresponding to the data configuration instruction;
adjusting and configuring the storage device data in the first database based on the data configuration information, and updating the log storage data in the second database according to the configured device data by a time node;
and generating a device configuration instruction based on the configured device data, and controlling the device to adjust according to the configured device data.
3. The internet of things communication method based on a distributed system according to claim 1, wherein after receiving the data request instruction sent by the user client, the method further comprises:
when the user client is monitored to establish connection through a communication protocol, acquiring flow transmission information of the user client in real time;
the traffic transmission information is arranged according to the transmission time node, and a transmission wave diagram of the user client for data transmission is obtained;
fitting the transmission fluctuation graph and a preset flow transmission graph according to the transmission time nodes, judging whether flow transmission data corresponding to different transmission time nodes are abnormal, if so, acquiring historical flow transmission data, and carrying out data transmission abnormality analysis on the user client based on the historical flow transmission data to obtain abnormal access degree of the user client, wherein the historical flow transmission data are flow transmission data of different types of user clients in data communication;
and comparing the abnormal access degree with the access degree in the abnormal access standard to obtain user access violation data, and adjusting the trust degree of the user client based on the user access violation data.
4. The internet of things communication method based on a distributed system according to claim 3, wherein performing data transmission anomaly analysis on the user client based on the historical traffic transmission data to obtain an anomaly access degree of the user client comprises:
determining the highest traffic transmission rate and the lowest traffic transmission rate of user clients of different models in the data communication process according to the historical traffic transmission data, taking the highest traffic transmission rate and the lowest traffic transmission rate as transmission molecules, and taking the time used in the data communication process as a transmission denominator;
obtaining a transmission rate change value of each data communication process according to the ratio of the transmission numerator to the transmission denominator;
the transmission rate change values are arranged according to a time sequence to obtain a transmission sequence of historical flow transmission data;
obtaining all division points in the transmission sequence according to the change values corresponding to the transmission rates of the user clients with different models in the transmission sequence and the numerical value of each transmission rate;
segmenting the transmission sequences according to all segmentation points, obtaining the similarity of the change value sequences corresponding to every two adjacent transmission sequences, judging whether the two adjacent transmission sequences need to be combined according to the similarity, and obtaining two or more transmission data segments;
Carrying out anomaly analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in the future preset time, so as to obtain the anomaly degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time;
and obtaining the abnormal access degree of the transmission data segment corresponding to the user client and the transmission time node with abnormal traffic transmission data based on the abnormal degree.
5. The internet of things communication method according to claim 4, wherein the performing exception analysis on each change value corresponding to each transmission data segment according to the data security condition of each change value corresponding to each transmission data segment in a preset future time to obtain exception degrees of different change values corresponding to different transmission data segments in each data communication process of user clients of different models comprises:
respectively acquiring the data security condition of each change value corresponding to each transmission data segment in the future preset time;
judging whether each change value corresponding to each transmission data segment has the data security condition, if so, inputting the data security condition into a traffic transmission abnormal model for identification, and obtaining the abnormal degree of different change values corresponding to different transmission data segments in the process of carrying out data communication by user clients of different models each time.
6. The Internet of things communication method based on the distributed system is characterized by being applied to a user client and comprising the following steps:
acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
if the user identity data in the user request data is preset identity data, generating a data request instruction based on the read data requirement in the user request data, and sending the data request instruction to a device communication end, so that the device communication end calls corresponding device data and log storage data in a first database and a second database based on the data request instruction;
and receiving the device data transmitted by the device communication terminal and the log storage data.
7. The internet of things communication method based on the distributed system according to claim 6, wherein the receiving the device data and the log storage data that are transmitted by the device communication end transmission further includes:
when a user configuration requirement is detected, determining configuration adjustment data according to the user configuration requirement, the equipment data and log storage data;
Generating a data configuration instruction according to the configuration adjustment data, and sending the data configuration instruction to the equipment communication terminal.
8. The utility model provides a thing networking communication system based on distributed system which characterized in that is applied to equipment communication end includes:
the data acquisition module is used for acquiring real-time detection data and equipment data based on a preset agreement, wherein the real-time detection data are data obtained by detecting different equipment in real time by a sensor, and the preset agreement is a communication protocol corresponding to the different sensors when uploading the real-time detection data and acquiring the equipment data;
the data binding module is used for binding the preset agreement protocol and the real-time detection data according to a time node to obtain log storage data;
the data storage module is used for respectively storing the equipment data and the log storage data into a first database and a second database, wherein the first database is a database for storing the equipment data, and the second database is a database for storing the log storage data in preset time;
the instruction analysis module is used for analyzing the data request instruction after receiving the data request instruction sent by the user client, so as to obtain a read data requirement corresponding to the data request instruction;
And the data return module is used for calling the corresponding device data and log storage data in the first database and the second database based on the read data requirement and sending the device data and the log storage data to the user client.
9. The utility model provides a thing networking communication system based on distributed system which characterized in that is applied to user's customer end, includes:
the request acquisition module is used for acquiring user request data and checking whether user identity data in the user request data is preset identity data or not;
the instruction sending module is used for generating a data request instruction based on the read data requirement in the user request data when the user identity data in the user request data is preset identity data, and sending the data request instruction to the equipment communication end so that the equipment communication end can call the corresponding equipment data and log storage data in the first database and the second database based on the data request instruction;
and the data receiving module is used for receiving the equipment data transmitted by the equipment communication terminal and the log storage data.
10. A computer-readable storage medium, characterized by: a computer program being stored which can be loaded by a processor and which performs the method according to any one of claims 1 to 5 or the method according to any one of claims 6 to 7.
CN202410016036.2A 2024-01-05 2024-01-05 Internet of things communication method, system and medium based on distributed system Active CN117527860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410016036.2A CN117527860B (en) 2024-01-05 2024-01-05 Internet of things communication method, system and medium based on distributed system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410016036.2A CN117527860B (en) 2024-01-05 2024-01-05 Internet of things communication method, system and medium based on distributed system

Publications (2)

Publication Number Publication Date
CN117527860A true CN117527860A (en) 2024-02-06
CN117527860B CN117527860B (en) 2024-04-09

Family

ID=89745978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410016036.2A Active CN117527860B (en) 2024-01-05 2024-01-05 Internet of things communication method, system and medium based on distributed system

Country Status (1)

Country Link
CN (1) CN117527860B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10423493B1 (en) * 2015-12-21 2019-09-24 Amazon Technologies, Inc. Scalable log-based continuous data protection for distributed databases
CN111628967A (en) * 2020-04-20 2020-09-04 深圳市广和通无线股份有限公司 Log data transmission method and device, computer equipment and storage medium
CN113297176A (en) * 2021-05-27 2021-08-24 焦作大学 Database access method based on Internet of things
WO2021217637A1 (en) * 2020-04-30 2021-11-04 上海华东汽车信息技术有限公司 Terminal policy configuration method and apparatus, and computer device and storage medium
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN114640548A (en) * 2022-05-18 2022-06-17 宁波市镇海区大数据投资发展有限公司 Network security sensing and early warning method and system based on big data
CN115396200A (en) * 2022-08-25 2022-11-25 康峰 Cross-platform data security management application method, device and system
CN115426375A (en) * 2022-08-30 2022-12-02 上海徐毓智能科技有限公司 Data processing method and data processing system
CN116383753A (en) * 2023-05-26 2023-07-04 深圳市博昌智控科技有限公司 Abnormal behavior prompting method, device, equipment and medium based on Internet of things
CN116702110A (en) * 2023-06-15 2023-09-05 深圳千岸科技股份有限公司 Method, device, equipment and storage medium for sharing big data of supply chain
CN116760822A (en) * 2023-07-24 2023-09-15 杭州萤石软件有限公司 Method, system and device for transmitting files of Internet of things equipment
CN117194338A (en) * 2023-09-26 2023-12-08 中国联合网络通信集团有限公司 Processing method, device, equipment and storage medium for distributed log data

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10423493B1 (en) * 2015-12-21 2019-09-24 Amazon Technologies, Inc. Scalable log-based continuous data protection for distributed databases
CN111628967A (en) * 2020-04-20 2020-09-04 深圳市广和通无线股份有限公司 Log data transmission method and device, computer equipment and storage medium
WO2021217637A1 (en) * 2020-04-30 2021-11-04 上海华东汽车信息技术有限公司 Terminal policy configuration method and apparatus, and computer device and storage medium
CN113297176A (en) * 2021-05-27 2021-08-24 焦作大学 Database access method based on Internet of things
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN114640548A (en) * 2022-05-18 2022-06-17 宁波市镇海区大数据投资发展有限公司 Network security sensing and early warning method and system based on big data
CN115396200A (en) * 2022-08-25 2022-11-25 康峰 Cross-platform data security management application method, device and system
CN115426375A (en) * 2022-08-30 2022-12-02 上海徐毓智能科技有限公司 Data processing method and data processing system
CN116383753A (en) * 2023-05-26 2023-07-04 深圳市博昌智控科技有限公司 Abnormal behavior prompting method, device, equipment and medium based on Internet of things
CN116702110A (en) * 2023-06-15 2023-09-05 深圳千岸科技股份有限公司 Method, device, equipment and storage medium for sharing big data of supply chain
CN116760822A (en) * 2023-07-24 2023-09-15 杭州萤石软件有限公司 Method, system and device for transmitting files of Internet of things equipment
CN117194338A (en) * 2023-09-26 2023-12-08 中国联合网络通信集团有限公司 Processing method, device, equipment and storage medium for distributed log data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陆世鹏;: "基于Spark Streaming的海量日志实时处理系统的设计", 电子产品可靠性与环境试验, no. 05, 20 October 2017 (2017-10-20) *

Also Published As

Publication number Publication date
CN117527860B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
CN111130912B (en) Anomaly positioning method for content distribution network, server and storage medium
EP3306868A1 (en) Relay device, network monitoring system, and program
CN110892675B (en) Method and apparatus for monitoring block chains
KR102376433B1 (en) A method of secure monitoring for multi network devices
CN109347880A (en) A kind of safety protecting method, apparatus and system
CN111680068A (en) Verification method, device, equipment and storage medium
CN110505220B (en) Method and device for supporting OPC protocol to realize dual-computer hot standby and communication terminal
CN116980958B (en) Radio equipment electric fault monitoring method and system based on data identification
US20240056463A1 (en) Method and system to detect abnormal message transactions on a network
CN117527860B (en) Internet of things communication method, system and medium based on distributed system
CN116340935B (en) Host vulnerability lightweight security detection method and system based on multiplex communication
CN114826788B (en) Equipment management and control system based on information security
CN114567511B (en) Lightweight malicious traffic detection method and device based on width learning
KR102369991B1 (en) Integrated management system for iot multi network secure
CN109803301B (en) Offline identification management system for wireless network
CN112866172A (en) Safety protection method and device, smart home system and computer readable medium
CN117834301B (en) Internet of things-based network security communication control method and system
CN115051922B (en) Link control method, device, electronic equipment and storage medium
CN109688142B (en) Threat management method and system in industrial control system network
CN117670022A (en) Data acquisition method and device, electronic equipment and storage medium
CN117692504A (en) State identification method, system, equipment and medium of Internet of things equipment
CN115633361A (en) Client management method and device, computer equipment and readable storage medium
CN115225375A (en) Industrial control flow detection method, device and equipment
CN118055105A (en) HTTP interaction method and system based on WebSocket protocol
CN117439855A (en) Asset supervision method and device based on agent tool and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant