Internet of things intrusion monitoring method and device

A technology of the Internet of Things and test data, applied in the field of Internet of Things security

Active Publication Date: 2020-07-28
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the embodiments of the present invention is to provide a method and device for intrusion monitoring of the Internet of Things, so as to solve the problem of monitoring intrusion behaviors in the perception layer of the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things intrusion monitoring method and device
  • Internet of things intrusion monitoring method and device
  • Internet of things intrusion monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0021] see figure 2 , the embodiment of the present invention provides a method for intrusion monitoring of the Internet of Things, the method comprising:

[0022] Step S200: Acquiring data collected by sensing devices at nodes of the sensing layer of the Internet of Things;

[0023] Step S210: Based on the obtained data as training data and using the TrAdaBoost method, an Internet of Things intrusion classification model is established, wherein the Internet of Things intrusion classification includes an intrusion behavior set and a normal behavior set;

[0024] Step S220: Obtain the test data collected by the sensing device at the sensing layer node of the Internet of Things again, and use the Internet of Things intrusion classification model to perform classification judgment;

[0025] Step S230: If the test data is divided into intrusion behavior sets, interception and alarm processing are performed;

[0026] Step S240: If the test data is classified into a normal behavi...

no. 2 example

[0029] see image 3 , the embodiment of the present invention provides a method for intrusion monitoring of the Internet of Things, the method comprising:

[0030] Step S300: Acquiring data collected by sensing devices at the sensing layer nodes of the Internet of Things;

[0031] The hierarchical structure of the Internet of Things is divided into three layers, from bottom to top: the perception layer, the network layer, and the application layer. The perception layer is the core of the Internet of Things and a key part of information collection. The perception layer is located at the bottom of the three-layer structure of the Internet of Things, and its function is "perception", that is, to obtain environmental information through the sensor network. The perception layer is the core of the Internet of Things and a key part of information collection.

[0032]The perception layer includes two-dimensional code tags and readers, RFID tags and readers, cameras, GPS, sensors, M...

no. 3 example

[0075] Please refer to Figure 4 , the embodiment of the present invention provides an Internet of Things intrusion monitoring device 400, the device 400 includes:

[0076]The first data acquisition unit 410 is configured to acquire data collected by sensing devices at the sensing layer nodes of the Internet of Things.

[0077] The Internet of Things intrusion classification model establishment unit 420 is configured to establish an Internet of Things intrusion classification model based on the obtained data as training data and using the TrAdaBoost method, wherein the Internet of Things intrusion classification includes an intrusion behavior set and a normal behavior set.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An Internet of Things intrusion monitoring method and device provided in embodiments of the present invention relate to the field of Internet of Things security. The method includes acquiring data collected by sensing devices at the sensing layer nodes of the Internet of Things; based on the acquired data as training data and using the TrAdaBoost method, establishing an Internet of Things intrusion classification model, wherein the Internet of Things intrusion classification includes An intrusion behavior set and a normal behavior set; obtain the test data collected by the perception device again at the sensing layer node of the Internet of Things, and use the Internet of Things intrusion classification model to classify and judge; if the test data is divided into an intrusion behavior set, then Interception and alarm processing are carried out to solve the problem of monitoring intrusion behaviors at the perception layer of the Internet of Things.

Description

technical field [0001] The present invention relates to the security field of the Internet of Things, in particular to a method and device for intrusion monitoring of the Internet of Things. Background technique [0002] As an important part of the communication network in the new information age, the Internet of Things communication technology can not only connect machines with machines to realize new transmission and sharing of physical world perception, but also connect machines with people to achieve a wider and more In-depth information interaction has become a new type of bridge connecting human subjective information service needs and various perception services in the objective world. The security of the perception layer of the Internet of Things is the premise and guarantee for the real practical application of the Internet of Things. The security threats faced by the sensing layer of the Internet of Things mainly include physical attacks, the danger of sensor equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L63/145G06F18/2148G06F18/2431
Inventor 郭燕慧孙博文李祺
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products