Two-way set top box intrusion detection system and detection method thereof

An intrusion detection system and a two-way set-top box technology, applied in the field of radio and network security, can solve problems such as interruption of legal programs, storage of illegal applications, destruction, etc., to achieve the effect of ensuring normal and uninterrupted operation, ensuring links, and ensuring network security

Active Publication Date: 2015-09-30
THE PLA INFORMATION ENG UNIV
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In August 2014, the Wenzhou Radio and Television Network was attacked by hackers, the legitimate programs were interrupted, and a large number of sensitive images appeared on the terminal, causing extremely bad effects. This sounded the alarm for the safety of the Radio and Television Network
Brewing large-scale security incidents by controlling a large number of set-top boxes, using the silent feature of set-top boxes to cause set-top boxes to download and store illegal applications and broadcast illegal information
(3) The access network has no boundary protection. Illegal terminals may easily enter the network with fake identities and carry out various sabotage activities; after entering the network, legal terminals may also access various network resources without authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way set top box intrusion detection system and detection method thereof
  • Two-way set top box intrusion detection system and detection method thereof
  • Two-way set top box intrusion detection system and detection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment one, see Figure 2~4 as shown, figure 2 The traffic comparison chart of the Internet and the radio network is given. The traffic components in the Internet are quite complex, the applications are numerous, and the traffic regularity is poor. This also prompts the use of various relatively complex detection methods to detect attacks at the Internet access network end. Ensure security; unlike the Internet, broadcast network traffic is small and its components are relatively simple, mainly just some video streams, customer on-demand streams, and set-top box recording streams that operators need to recycle within a certain period of time. These predictable broadcast network traffic can be processed It is not as complicated as the Internet; therefore, the radio network access network does not need to follow the security mechanism of the Internet access network, and it can directly use a simpler detection system or method to complete the security detection of the ...

Embodiment 2

[0044] Embodiment two, see Figure 5 As shown, it is basically the same as Embodiment 1, except that the rear subsystem further includes a security detection module, which compares and detects security threats based on a security threat database, and notifies the front subsystem in real time. The back-end system is equipped with a safety detection module, including a safety detection module with known threat characteristics and a safety detection module with unknown threat characteristics. The security detection module with known threat characteristics maintains various security threat databases with known characteristics, and performs security threat detection on input traffic according to known characteristics. The security detection module of unknown threat characteristics uses the method of big data association analysis newly proposed in recent years to detect security threats, analyze the threat characteristics of the detected threats, and add the analysis results to the ...

Embodiment 3

[0045] Embodiment 3 is basically the same as Embodiment 1, except that the two-way set-top box intrusion detection system also includes a wire-speed serial connection optical / electrical switching protection module, and the wire-speed serial connection optical / electrical switching protection module is connected in series upstream of the OLT The interruption problem in the bidirectional link ensures the smooth flow of the link. When a fault occurs, the link can be switched to the transparent transmission mode in real time, and the fault point can be automatically avoided in real time, thereby ensuring the normal and uninterrupted operation of the access network.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a two-way set top box intrusion detection system and a detection method thereof. The intrusion detection system comprises a former subsystem and a back-end subsystem, wherein the former subsystem is connected with an OLT (Optical Line Terminal) upstream two-way link and collects and processes two-way traffic in and out of the OLT upstream two-way link; the back-end subsystem carries out safety detection and data analysis on a data packet of the former subsystem. The intrusion detection system is arranged on the OLT upstream two-way link, so that the merged traffic is identified intelligently in real time, the former subsystem detects in real time, and vicious attack traffic is blocked and cleared; normal and continuous operation of an access network is ensured, the interruption problem probably caused by serial connection in the link is solved, and the smoothness of the link is ensured; the system has no IP (Internet Protocol) address detected by outside, is similar to a transparent transmission device of a physical layer and a section of optical fiber, has natural invisibility characteristic, can be prevented from being detected by attackers, and can ensure self-network safety.

Description

technical field [0001] The invention relates to the technical field of radio network security, in particular to a two-way set-top box intrusion detection system and a detection method thereof. Background technique [0002] In August 2014, the Wenzhou Radio and Television Network was attacked by hackers, the legitimate programs were interrupted, and a large number of sensitive images appeared on the terminal, causing extremely bad effects. This sounded the alarm for the security of the Radio and Television Network. In the evolution of the triple play, the original safe part of the broadcasting network may become unsafe under the new integration situation. While the two-way transformation brings independent and personalized video viewing services to ordinary users, it also provides an attack path for malicious attackers. The traditional one-way broadcasting network security cornerstone no longer exists. The intelligentization of terminals and the networking of TVs have also b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/442H04N21/24
CPCH04N21/2407H04N21/44236
Inventor 李玉峰张明明李康士于松林王文功陈博张传浩杜飞
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products