CN117879974A - Network security protection method based on edge calculation - Google Patents

Network security protection method based on edge calculation Download PDF

Info

Publication number
CN117879974A
CN117879974A CN202410268587.8A CN202410268587A CN117879974A CN 117879974 A CN117879974 A CN 117879974A CN 202410268587 A CN202410268587 A CN 202410268587A CN 117879974 A CN117879974 A CN 117879974A
Authority
CN
China
Prior art keywords
edge processing
cluster
execution body
information
body set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410268587.8A
Other languages
Chinese (zh)
Other versions
CN117879974B (en
Inventor
柳刚
范礼
柳梧桐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xichang College
Original Assignee
Xichang College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xichang College filed Critical Xichang College
Priority to CN202410268587.8A priority Critical patent/CN117879974B/en
Priority claimed from CN202410268587.8A external-priority patent/CN117879974B/en
Publication of CN117879974A publication Critical patent/CN117879974A/en
Application granted granted Critical
Publication of CN117879974B publication Critical patent/CN117879974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a network security protection method based on edge calculation, which specifically comprises the following steps: s1, initializing and configuring each edge processing cluster by a security defense layer; s2, the external terminal sends request information to the information agent layer, and the information agent layer performs initial security detection according to the request times of the external terminal; s3, analyzing request information of an external terminal by the edge processing cluster, performing secondary safety detection, entering S4 if the secondary safety detection passes, and performing corresponding processing according to the detected virus type if the secondary safety detection does not pass; s4, the edge processing cluster judges whether the operation related to the request information needs assistance of a central server, and decides whether final security detection is carried out according to a judging result. In the invention, the initial security detection, the secondary security detection and the final security detection are mutually matched, and network security protection is carried out from multiple dimensions, so that the security problem of the edge computing network is better solved.

Description

Network security protection method based on edge calculation
Technical Field
The invention relates to the technical field of network security, in particular to a network security protection method based on edge calculation.
Background
Because the traditional cloud computing is centralized processing, the centralized processing cannot cope with the data generation amount of the future internet of things TB/second, and then the edge computing for the future internet of things is generated. Edge computing transfers pre-processing, privacy data storage, and real-time data processing and analysis of applications from the cloud server center to the network edge device, storing real-time control and sensitive data to the network edge device while retaining the core benefits of cloud computing. The rapidly developed edge computing network brings convenience service to people, and simultaneously exposes a large number of safety problems, and has the following characteristics: 1) The potential attack surface faced by the network edge equipment and the cloud server is enlarged; 2) The lack of security situation awareness of the edge computing network by the manager results in failure to perform cooperative defense, and the conventional security defense method cannot well solve the security problem of the edge computing network, so a new security defense method is needed to solve the security problem of the edge computing network.
Disclosure of Invention
In order to better solve the security problem faced by the edge computing network, the edge computing network provided by the invention comprises a central server, a security defense layer and an information agent layer, wherein a plurality of edge processing clusters are arranged between the security defense layer and the information agent layer, and the network security protection method based on edge computing specifically comprises the following steps:
s1, initializing and configuring each edge processing cluster by the security defense layer;
s2, the external terminal sends request information to the information agent layer, and the information agent layer performs initial security detection according to the request times of the external terminal;
s3, analyzing request information of an external terminal by the edge processing cluster, performing secondary safety detection, entering S4 if the secondary safety detection passes, and performing corresponding processing according to the detected virus type if the secondary safety detection does not pass;
s4, the edge processing cluster judges whether the operation related to the request information needs the assistance of the central server, if so, final security detection is carried out, and under the condition that the final security detection passes, the edge processing cluster and the central server are mutually matched to complete the request of the external terminal, and if not, the edge processing cluster is used for completing the request of the external terminal.
Preferably, the security defense layer includes a plurality of area servers, the area servers are in communication connection with the central server through cloud application program interfaces, the edge processing cluster includes a plurality of edge processing devices, the edge processing devices are in communication connection with the area servers through service application program interfaces, virus databases are stored in the edge processing devices, hardware configuration and virus databases of the edge processing devices are different, the information proxy layer includes a plurality of proxy devices, the proxy devices are in one-to-one correspondence with the edge processing cluster, and the proxy devices are respectively in communication connection with the area servers and the edge processing devices through the service application program interfaces.
Preferably, in the step S1, the specific process of initializing the configuration includes:
s11, grouping edge processing equipment by the area server based on a virus database to obtain a plurality of candidate groups of protection executors;
s12, the regional server acquires a cluster defense command candidate group based on the operation performance of the edge processing equipment;
s13, the regional server sets a current executive body set and a current cluster defense command node according to the protection executive body candidate set and the cluster defense command candidate set;
s14, setting the update time as the current time.
Preferably, in S11, the area server compares the edge processing devices two by two, identifies the edge processing devices with the similarity of greater than 90% in the virus database as similar devices, and divides the similar devices into a group to obtain a plurality of candidate groups of protection executors.
Preferably, in S12, the area server tests each edge processing device by using CPU reference run score software Cinebench, obtains a corresponding evaluation score, sorts the edge processing devices according to the order of the evaluation scores from high to low, and selects the edge processing devices located in the first 20% to form a cluster defense command candidate group.
Preferably, in S13, the specific process includes:
s131, the area server randomly selects an edge processing device from each protection execution body candidate group to form an initial execution body set;
s132, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S131 if the number is equal to 0, takes the initial execution body set as the current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the current cluster defense command node, takes the initial execution body set as the current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the current cluster defense command node.
Preferably, in the step S2, the initial security detection specifically includes:
s21, the proxy equipment performs identity authentication on the external terminal, if the authentication is not passed, the proxy equipment stops receiving information, and if the authentication is passed, S22 is entered;
s22, in a local monitoring period before the current moment, the proxy equipment calculates local request times of the external terminal for the proxy equipment, if the local request times exceed a local threshold value, the proxy equipment stops receiving information, and if the local request times do not exceed the local threshold value, the method enters S23;
s23, the proxy equipment sends the identity information of the external terminals to the regional server, the regional server calculates the total request times of all the external terminals for the edge calculation network in the global monitoring period before the current moment, judges whether the total request times of all the external terminals exceed a global threshold value, stops receiving the sent information of the external terminals with the total request times exceeding the global threshold value, normally receives the sent information of the external terminals with the total request times not exceeding the global threshold value, and forwards the information to the corresponding edge processing cluster.
Preferably, in the step S3, the secondary security detection specifically includes:
s31, making a difference between the current time and the update time, judging whether the difference is larger than an update interval threshold, if so, entering S32, otherwise, entering S33;
s32, updating the current executive body set and the current cluster defense command node, and setting the update time as the current time;
s33, under the control of the current cluster defense command node, edge processing equipment in the current executive body set detects the request information based on a built-in virus database, the current cluster defense command node gathers the detection information, judges whether the virus information is detected, if the virus information is detected, the secondary safety detection is failed, and if the virus information is not detected, the secondary safety detection is passed.
Preferably, in S32, the specific updating process includes:
s321, randomly selecting an updating number N from 1-N by the area server, wherein N is the total number of the candidate groups of the protection executor;
s322, randomly selecting n protection execution body candidate groups as update objects by the area server;
s323, the regional server randomly selects an edge processing device from the updated object to replace the edge processing devices belonging to the same protection execution body candidate group in the current execution body set to form an initial execution body set;
s324, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S322, takes the initial execution body set as the updated current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the updated current cluster defense command node, takes the initial execution body set as the updated current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the updated current cluster defense command node.
Preferably, in the step S4, the specific process of the final security detection is that the request information is sent to the security defense layer, the area server constructs a virtual operation environment, processes the request information in the virtual operation environment, judges whether an abnormal condition occurs, if the abnormal condition occurs, the final security detection is failed, and if the abnormal condition does not occur, the final security detection is passed.
Compared with the prior art, the invention has the following beneficial effects:
the initial security detection, the secondary security detection and the final security detection are mutually matched, network security protection is carried out from multiple dimensions, and the security problem of an edge computing network is better solved.
Drawings
FIG. 1 is a block diagram of an edge computing network in accordance with the present invention;
fig. 2 is a flow chart of a network security protection method in the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail with reference to the accompanying drawings, and the described embodiments should not be construed as limiting the present application, and all other embodiments obtained by those skilled in the art without making any inventive effort are within the scope of the present application.
As shown in fig. 1, the edge computing network proposed by the present invention includes a central server 1, a security defense layer 2 and an information agent layer 4, and a plurality of edge processing clusters 3 are disposed between the security defense layer 2 and the information agent layer 4. The security protection layer 2 comprises a plurality of area servers 21, the area servers 21 are in communication connection with the central server 1 through a cloud application program interface, and the area servers 21 are connected with each other through a block link. The edge processing cluster 3 includes a plurality of edge processing devices, the edge processing devices are in communication connection with the area server 21 through a service application program interface, virus databases are stored in the edge processing devices, and the hardware configuration and the virus databases of the edge processing devices are different. The information agent layer 4 includes a plurality of agent devices 41, the agent devices 41 are in one-to-one correspondence with the edge processing clusters 3, and the agent devices 41 are respectively in communication connection with the area server 21 and the edge processing devices through service application program interfaces.
As shown in fig. 2, based on the edge computing network, the network security protection method based on edge computing provided by the invention specifically includes the following steps:
s1, initializing and configuring each edge processing cluster by the security defense layer. The specific process of initializing the configuration comprises the following steps:
s11, grouping edge processing equipment based on a virus database by the area server to obtain a plurality of protection execution body candidate groups, specifically, comparing the edge processing equipment two by the area server, identifying the edge processing equipment with the similarity of the virus database being more than 90% as similar equipment, and dividing the similar equipment into a group to obtain a plurality of protection execution body candidate groups.
S12, the regional server acquires cluster defense command candidate groups based on the operation performance of the edge processing equipment, specifically, the regional server tests each edge processing equipment by utilizing CPU reference run score software Cinebench, acquires corresponding evaluation scores, orders the edge processing equipment according to the order of the evaluation scores from high to low, and selects the edge processing equipment positioned in the first 20% to form the cluster defense command candidate groups.
S13, the area server sets a current executive body set and a current cluster defense command node according to the protection executive body candidate set and the cluster defense command candidate set, and specifically comprises the following steps:
s131, the area server randomly selects an edge processing device from each protection execution body candidate group to form an initial execution body set;
s132, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S131 if the number is equal to 0, takes the initial execution body set as the current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the current cluster defense command node, takes the initial execution body set as the current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the current cluster defense command node.
S14, setting the update time as the current time.
S2, the external terminal sends request information to the information agent layer, and the information agent layer performs initial security detection according to the request times of the external terminal. The initial security detection specifically includes:
s21, the proxy equipment performs identity authentication on the external terminal, if the authentication is not passed, the proxy equipment stops receiving information, and if the authentication is passed, S22 is entered;
s22, in a local monitoring period before the current moment, the proxy equipment calculates local request times of the external terminal for the proxy equipment, if the local request times exceed a local threshold value, the proxy equipment stops receiving information, and if the local request times do not exceed the local threshold value, the method enters S23;
s23, the proxy equipment sends the identity information of the external terminals to the regional server, the regional server calculates the total request times of all the external terminals for the edge calculation network in the global monitoring period before the current moment, judges whether the total request times of all the external terminals exceed a global threshold value, stops receiving the sent information of the external terminals with the total request times exceeding the global threshold value, normally receives the sent information of the external terminals with the total request times not exceeding the global threshold value, and forwards the information to the corresponding edge processing cluster.
S3, the edge processing cluster analyzes the request information of the external terminal, secondary safety detection is carried out, if the secondary safety detection passes, S4 is carried out, and if the secondary safety detection does not pass, corresponding processing is carried out according to the detected virus type. The secondary security detection specifically comprises:
s31, the current time and the update time are subjected to difference, whether the difference is larger than an update interval threshold value is judged, if so, S32 is entered, and if not, S33 is entered.
S32, updating the current execution body set and the current cluster defense command node, and setting the update time as the current time. The updating concrete process comprises the following steps:
s321, randomly selecting an updating number N from 1-N by the area server, wherein N is the total number of the candidate groups of the protection executor;
s322, randomly selecting n protection execution body candidate groups as update objects by the area server;
s323, the regional server randomly selects an edge processing device from the updated object to replace the edge processing devices belonging to the same protection execution body candidate group in the current execution body set to form an initial execution body set;
s324, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S322, takes the initial execution body set as the updated current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the updated current cluster defense command node, takes the initial execution body set as the updated current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the updated current cluster defense command node.
S33, under the control of the current cluster defense command node, edge processing equipment in the current executive body set detects the request information based on a built-in virus database, the current cluster defense command node gathers the detection information, judges whether the virus information is detected, if the virus information is detected, the secondary safety detection is failed, and if the virus information is not detected, the secondary safety detection is passed.
S4, the edge processing cluster judges whether the operation related to the request information needs the assistance of the central server, if so, final security detection is carried out, and under the condition that the final security detection passes, the edge processing cluster and the central server are mutually matched to complete the request of the external terminal, and if not, the edge processing cluster is used for completing the request of the external terminal. The specific process of the final security detection is that request information is sent to a security defense layer, a virtual operation environment is constructed by the regional server, the request information is processed in the virtual operation environment, whether abnormal conditions occur or not is judged, if the abnormal conditions occur, the final security detection is failed, and if the abnormal conditions do not occur, the final security detection is passed.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The network security protection method based on edge calculation is characterized in that an edge calculation network comprises a central server, a security defense layer and an information agent layer, a plurality of edge processing clusters are arranged between the security defense layer and the information agent layer, and the network security protection method specifically comprises the following steps:
s1, initializing and configuring each edge processing cluster by the security defense layer;
s2, the external terminal sends request information to the information agent layer, and the information agent layer performs initial security detection according to the request times of the external terminal;
s3, analyzing request information of an external terminal by the edge processing cluster, performing secondary safety detection, entering S4 if the secondary safety detection passes, and performing corresponding processing according to the detected virus type if the secondary safety detection does not pass;
s4, the edge processing cluster judges whether the operation related to the request information needs the assistance of the central server, if so, final security detection is carried out, and under the condition that the final security detection passes, the edge processing cluster and the central server are mutually matched to complete the request of the external terminal, and if not, the edge processing cluster is used for completing the request of the external terminal.
2. The network security protection method according to claim 1, wherein the security protection layer comprises a plurality of area servers, the area servers are in communication connection with the central server through cloud application program interfaces, the edge processing cluster comprises a plurality of edge processing devices, the edge processing devices are in communication connection with the area servers through service application program interfaces, virus databases are stored in the edge processing devices, the hardware configuration and the virus databases of the edge processing devices are different, the information proxy layer comprises a plurality of proxy devices, the proxy devices are in one-to-one correspondence with the edge processing cluster, and the proxy devices are respectively in communication connection with the area servers and the edge processing devices through the service application program interfaces.
3. The network security protection method according to claim 2, wherein in S1, the specific process of initializing the configuration includes:
s11, grouping edge processing equipment by the area server based on a virus database to obtain a plurality of candidate groups of protection executors;
s12, the regional server acquires a cluster defense command candidate group based on the operation performance of the edge processing equipment;
s13, the regional server sets a current executive body set and a current cluster defense command node according to the protection executive body candidate set and the cluster defense command candidate set;
s14, setting the update time as the current time.
4. The network security protection method according to claim 3, wherein in S11, the area server compares the edge processing devices two by two, identifies the edge processing devices with a virus database similarity greater than 90% as similar devices, and divides the similar devices into a group to obtain a plurality of candidate groups of protection executors.
5. The network security protection method according to claim 3, wherein in S12, the regional server tests each edge processing device by using CPU benchmark score software Cinebench, obtains a corresponding evaluation score, orders the edge processing devices according to the order of the evaluation scores from high to low, and selects the edge processing devices located in the first 20% to form a cluster defense command candidate group.
6. The network security protection method according to claim 3, wherein in S13, the specific process includes:
s131, the area server randomly selects an edge processing device from each protection execution body candidate group to form an initial execution body set;
s132, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S131 if the number is equal to 0, takes the initial execution body set as the current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the current cluster defense command node, takes the initial execution body set as the current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the current cluster defense command node.
7. The network security protection method according to claim 2, wherein in S2, the initial security detection specifically includes:
s21, the proxy equipment performs identity authentication on the external terminal, if the authentication is not passed, the proxy equipment stops receiving information, and if the authentication is passed, S22 is entered;
s22, in a local monitoring period before the current moment, the proxy equipment calculates local request times of the external terminal for the proxy equipment, if the local request times exceed a local threshold value, the proxy equipment stops receiving information, and if the local request times do not exceed the local threshold value, the method enters S23;
s23, the proxy equipment sends the identity information of the external terminals to the regional server, the regional server calculates the total request times of all the external terminals for the edge calculation network in the global monitoring period before the current moment, judges whether the total request times of all the external terminals exceed a global threshold value, stops receiving the sent information of the external terminals with the total request times exceeding the global threshold value, normally receives the sent information of the external terminals with the total request times not exceeding the global threshold value, and forwards the information to the corresponding edge processing cluster.
8. The network security protection method according to claim 2, wherein in S3, the secondary security detection specifically includes:
s31, making a difference between the current time and the update time, judging whether the difference is larger than an update interval threshold, if so, entering S32, otherwise, entering S33;
s32, updating the current executive body set and the current cluster defense command node, and setting the update time as the current time;
s33, under the control of the current cluster defense command node, edge processing equipment in the current executive body set detects the request information based on a built-in virus database, the current cluster defense command node gathers the detection information, judges whether the virus information is detected, if the virus information is detected, the secondary safety detection is failed, and if the virus information is not detected, the secondary safety detection is passed.
9. The network security protection method according to claim 8, wherein in S32, the specific process of updating includes:
s321, randomly selecting an updating number N from 1-N by the area server, wherein N is the total number of the candidate groups of the protection executor;
s322, randomly selecting n protection execution body candidate groups as update objects by the area server;
s323, the regional server randomly selects an edge processing device from the updated object to replace the edge processing devices belonging to the same protection execution body candidate group in the current execution body set to form an initial execution body set;
s324, the regional server judges edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time, calculates the number of the edge processing devices, returns to S322, takes the initial execution body set as the updated current execution body set if the number is equal to 1, takes the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time as the updated current cluster defense command node, takes the initial execution body set as the updated current execution body set if the number is greater than 1, acquires the order of the edge processing devices belonging to the initial execution body set and the cluster defense command candidate group at the same time in the cluster defense command candidate group, and selects the edge processing device with the forefront order as the updated current cluster defense command node.
10. The network security protection method according to claim 2, wherein in S4, the specific process of the final security detection is to send the request information to the security defense layer, the regional server constructs a virtual running environment, processes the request information in the virtual running environment, determines whether an abnormal situation occurs, if the abnormal situation occurs, the final security detection is failed, and if the abnormal situation does not occur, the final security detection is passed.
CN202410268587.8A 2024-03-11 Network security protection method based on edge calculation Active CN117879974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410268587.8A CN117879974B (en) 2024-03-11 Network security protection method based on edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410268587.8A CN117879974B (en) 2024-03-11 Network security protection method based on edge calculation

Publications (2)

Publication Number Publication Date
CN117879974A true CN117879974A (en) 2024-04-12
CN117879974B CN117879974B (en) 2024-05-14

Family

ID=

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994008118A1 (en) * 1992-09-25 1994-04-14 Rockwell International Corporation Safety edge switch for detection of obstructions encountered by a moving object
CN1705262A (en) * 2004-05-27 2005-12-07 华为技术有限公司 Network security protecting system and method
US20060204206A1 (en) * 2005-03-09 2006-09-14 Achim Leeser Safety edge with status and failure recognition
US20170068003A1 (en) * 2015-09-07 2017-03-09 Nuctech Company Limited Safety inspection detector and goods safety inspection system
CN107612933A (en) * 2017-10-20 2018-01-19 广东岭南职业技术学院 A kind of novel computer internet worm system of defense
CN108093401A (en) * 2017-12-13 2018-05-29 电子科技大学 A kind of mobile intelligent terminal intimacy protection system and method based on edge calculations
CN110034968A (en) * 2019-03-12 2019-07-19 上海交通大学 Multi-sensor Fusion vehicle safety method for detecting abnormality based on edge calculations
CN111669407A (en) * 2020-06-30 2020-09-15 日照职业技术学院 Method for realizing point-to-point secure communication of Internet of things based on cloud security authentication
CN112153641A (en) * 2020-09-09 2020-12-29 上海微波技术研究所(中国电子科技集团公司第五十研究所) Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
CN112615873A (en) * 2020-12-23 2021-04-06 苏州三六零智能安全科技有限公司 Internet of things equipment safety detection method, equipment, storage medium and device
CN112926059A (en) * 2021-04-07 2021-06-08 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN113676486A (en) * 2021-08-27 2021-11-19 国网浙江桐乡市供电有限公司 Edge internet of things proxy security policy
WO2022012294A1 (en) * 2020-07-16 2022-01-20 青岛海尔工业智能研究院有限公司 Security control method, apparatus and system, electronic device, and storage medium
CN115225667A (en) * 2022-07-08 2022-10-21 慧之安信息技术股份有限公司 Train safety detection auxiliary method based on edge calculation
CN116261137A (en) * 2021-12-10 2023-06-13 中国电信股份有限公司 Network element security authentication method and device, electronic equipment and storage medium
CN116680752A (en) * 2023-05-23 2023-09-01 杭州水立科技有限公司 Hydraulic engineering safety monitoring method and system based on data processing
CN116938608A (en) * 2023-09-19 2023-10-24 北京慧嘉科技有限公司 Network security protection method and system based on mimicry defense
CN117579789A (en) * 2024-01-16 2024-02-20 西昌学院 School monitoring system based on big data acquisition

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994008118A1 (en) * 1992-09-25 1994-04-14 Rockwell International Corporation Safety edge switch for detection of obstructions encountered by a moving object
CN1705262A (en) * 2004-05-27 2005-12-07 华为技术有限公司 Network security protecting system and method
US20060204206A1 (en) * 2005-03-09 2006-09-14 Achim Leeser Safety edge with status and failure recognition
US20170068003A1 (en) * 2015-09-07 2017-03-09 Nuctech Company Limited Safety inspection detector and goods safety inspection system
CN107612933A (en) * 2017-10-20 2018-01-19 广东岭南职业技术学院 A kind of novel computer internet worm system of defense
CN108093401A (en) * 2017-12-13 2018-05-29 电子科技大学 A kind of mobile intelligent terminal intimacy protection system and method based on edge calculations
CN110034968A (en) * 2019-03-12 2019-07-19 上海交通大学 Multi-sensor Fusion vehicle safety method for detecting abnormality based on edge calculations
CN111669407A (en) * 2020-06-30 2020-09-15 日照职业技术学院 Method for realizing point-to-point secure communication of Internet of things based on cloud security authentication
WO2022012294A1 (en) * 2020-07-16 2022-01-20 青岛海尔工业智能研究院有限公司 Security control method, apparatus and system, electronic device, and storage medium
CN112153641A (en) * 2020-09-09 2020-12-29 上海微波技术研究所(中国电子科技集团公司第五十研究所) Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
CN112615873A (en) * 2020-12-23 2021-04-06 苏州三六零智能安全科技有限公司 Internet of things equipment safety detection method, equipment, storage medium and device
CN112926059A (en) * 2021-04-07 2021-06-08 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN113676486A (en) * 2021-08-27 2021-11-19 国网浙江桐乡市供电有限公司 Edge internet of things proxy security policy
CN116261137A (en) * 2021-12-10 2023-06-13 中国电信股份有限公司 Network element security authentication method and device, electronic equipment and storage medium
CN115225667A (en) * 2022-07-08 2022-10-21 慧之安信息技术股份有限公司 Train safety detection auxiliary method based on edge calculation
CN116680752A (en) * 2023-05-23 2023-09-01 杭州水立科技有限公司 Hydraulic engineering safety monitoring method and system based on data processing
CN116938608A (en) * 2023-09-19 2023-10-24 北京慧嘉科技有限公司 Network security protection method and system based on mimicry defense
CN117579789A (en) * 2024-01-16 2024-02-20 西昌学院 School monitoring system based on big data acquisition

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
PING GAO: ""An Edge Computing-Based Paltform of Railway Signalling System On-site Digital Smart Test"", 《2022 IEEE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION ENGINEERING (ICITE)》, 18 April 2023 (2023-04-18) *
杨亮;朴春慧;刘玉红;冀梅梅;: "基于边缘计算的铁路施工项目安全监管数据共享研究", 电信科学, no. 06 *
范礼: ""工业控制中的仿人智能控制"", 《自动化应用》, 25 November 2015 (2015-11-25) *
雷文鑫: ""基于边缘计算的工业物联网安全技术研究"", 《中国博士学位论文全文数据库 信息科技辑》, 15 March 2024 (2024-03-15) *
黄昌正: ""边缘计算网络安全防护研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》, 15 January 2022 (2022-01-15) *

Similar Documents

Publication Publication Date Title
CN111652496B (en) Running risk assessment method and device based on network security situation awareness system
WO2022068645A1 (en) Database fault discovery method, apparatus, electronic device, and storage medium
CN109586952B (en) Server capacity expansion method and device
CN106209405B (en) Method for diagnosing faults and device
CN110401662B (en) Industrial control equipment fingerprint identification method and storage medium
CN112783682B (en) Abnormal automatic repairing method based on cloud mobile phone service
CN111092786A (en) Network equipment safety authentication service reliability enhancing system
CN112954031B (en) Equipment state notification method based on cloud mobile phone
CN110083515A (en) Quick judgment method, device and the storage medium of slow disk in distributed memory system
CN112579603A (en) CDC-based data model dynamic information perception monitoring method and device
CN113438110A (en) Cluster performance evaluation method, device, equipment and storage medium
CN117879974B (en) Network security protection method based on edge calculation
CN112037052B (en) User behavior detection method and device
CN112818343B (en) Block chain big data analysis early warning method and system and cloud platform
CN112969172B (en) Communication flow control method based on cloud mobile phone
CN108255703B (en) SQL script fault repairing method and terminal thereof
CN117879974A (en) Network security protection method based on edge calculation
CN116681350A (en) Intelligent factory fault detection method and system
CN110545268A (en) multidimensional mimicry voting method based on process elements
CN116451234A (en) Dynamic trust evaluation algorithm for operating system terminal
WO2022100146A1 (en) Internet performance monitoring method and system
CN111258788B (en) Disk failure prediction method, device and computer readable storage medium
CN114003466A (en) Fault root cause positioning method for micro-service application program
CN112711510A (en) Automatic adaptation method and system for monitoring service continuity operation
CN112417446A (en) Software defined network anomaly detection architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant