Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Immune-based Internet of Things distributed intrusion detection method and system

An intrusion detection and Internet of Things technology, applied in the field of Internet of Things information security, can solve problems such as inability to adapt to the Internet of Things network environment, and achieve the effects of improving intrusion detection performance, improving Internet of Things environment capabilities, and reducing training costs.

Active Publication Date: 2018-05-18
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The network anomaly detection method based on the principle of artificial immunity described in Chinese Patent Publication No. CN101478534 first collects training antigen data, then learns the artificial immune system, and finally detects network anomalies; the method described in CN1777119 first obtains the host audit Detecting data sources of data and network packet data and formatting its characteristics, then generating a detector set, and finally performing anomaly detection through the detector set; a method based on artificial immunity put into a dynamic network described in Chinese Patent Publication No. CN101299691B The grid intrusion detection method firstly obtains a mature detector, and then under the coordination of the artificial immune mechanism, dynamically handles the intrusion detection problem in the grid environment. In the above three patents, it is difficult to realize the method of learning first and then detecting. To adapt to the complex network situation and the need for fast and real-time detection in high-speed networks, the wireless sensor network environment faced by the Internet of Things is ever-changing. If the detection measures of the traditional static intrusion detection technology remain unchanged, it cannot adapt to the Changes in the networking environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Immune-based Internet of Things distributed intrusion detection method and system
  • Immune-based Internet of Things distributed intrusion detection method and system
  • Immune-based Internet of Things distributed intrusion detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Embodiment 1: an immune-based Internet of Things distributed intrusion detection method, specifically comprising the following steps:

[0055] Step 101: Build an immune-based IoT distributed intrusion detection overall model, including a central sub-model and at least three identical local sub-models; the local sub-models are connected to the IoT gateway in a bypass manner, and each local sub-model The model runs independently in a distributed manner, and is managed and coordinated by the central sub-model. The local sub-model and the central sub-model together constitute the overall model of the immune-based IoT distributed intrusion detection model.

[0056] Step 102: Establish a local sub-model: the local sub-model includes a detector and an antigen, the antigen is a data feature of the perception layer data of the Internet of Things, and the antigen is divided into self and non-self, and the self is a data feature of normal data, The non-self is a data feature of th...

Embodiment 2

[0067] Embodiment 2: Another immune-based Internet of Things distributed intrusion detection method specifically includes the following steps:

[0068] Step 201: Construct an overall immune-based IoT distributed intrusion detection model, including a central sub-model and at least three identical local sub-models; the local sub-models are connected to the IoT gateway in a bypass manner, and each local sub-model The model runs independently in a distributed manner, and is managed and coordinated by the central sub-model. The local sub-model and the central sub-model together constitute the overall model of the immune-based IoT distributed intrusion detection model.

[0069] Step 202: Establish a local sub-model: the local sub-model includes a detector and an antigen, the antigen is a data feature of the perception layer data of the Internet of Things, and the antigen is divided into self and non-self, and the self is a data feature of normal data, The non-self is a data feature...

Embodiment 3

[0089] Embodiment 3: an immune-based distributed intrusion detection system for the Internet of Things, comprising:

[0090] Overall model module 301, local sub-model module and central sub-model module, described local sub-model module includes initialization module 302, autologous conversion module 303, antigen conversion module 304, memory detector generation module 305; described central sub-model The modules include a vaccine receiving module 306, a vaccine packaging module 307, and a vaccination module 308; the overall model module 301 is sequentially connected to an initialization module 302, an autologous conversion module 303, an antigen conversion module 304, a memory detector generation module 305, a vaccine receiving module 306, and a vaccine packaging module. Module 307, vaccination module 308.

[0091] The overall model module 301 is used to construct an overall model of an immune-based distributed intrusion detection of the Internet of Things, including a centra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an immunity based IoT distributed invasion detection method. The method comprises the following steps that an integral immunity based IoT distributed invasion detection model is constructed, local sub-models and a central sub-model are constructed, the local sub-models train a new memory detector, the central sub-model receives and packages a new vaccine including the memory detector, global vaccination is carried out, and invasion detection for the IoT is realized. The invention also discloses an immunity based IoT distributed invasion detection system which comprises an integral model module, a local sub-model module and a central sub-model module; the local sub-model module comprises an initialization module, an autologous conversion module, an antigen conversion module and a memory detector generation module; and the central sub-model module comprises a vaccine reception module, a vaccine packaging module and a vaccination module. According to the system and method, a distributed cooperation mechanism is used to improve the capability of detecting global invasion of the IoT.

Description

technical field [0001] The invention relates to the field of information security of the Internet of Things, in particular to an immune-based distributed intrusion detection method and system of the Internet of Things. Background technique [0002] As the Internet of Things continues to be popularized and applied, more and more sensing nodes will be exposed to unmanned monitoring environments, and the security threats they face will become increasingly prominent. Attackers with ulterior motives are also trying to use vulnerable sensing nodes to attack the Internet of Things. IoT security issues have become a hot topic for researchers. The Internet of Things faces not only traditional attacks such as replay attacks and denial of service attacks, but also unique attacks such as cloning attacks, copying attacks, impersonation attacks, and interference attacks. Foreign scholars have described an attack on an Internet of Things system that remotely controls electric furnaces, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06N3/00H04L12/24
CPCG06N3/00H04L41/145H04L63/1416H04L63/1425
Inventor 朱颢东李红婵南姣芬张志锋赵进超
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products