Attack defense method and device, IOT (Internet of Things) device and computer readable storage medium

A technology of IoT devices and computers, applied in the field of IoT, can solve problems such as poor defense capabilities, and achieve the effect of improving the ability to deal with attacks

Active Publication Date: 2019-01-18
QINGDAO HAIER TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention proposes an attack defense method, device, Internet of Things device, and computer-readable storage medium to solve the problem of poor defense capabilities of Internet of Things devices in the prior art when they are attacked by a network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method and device, IOT (Internet of Things) device and computer readable storage medium
  • Attack defense method and device, IOT (Internet of Things) device and computer readable storage medium
  • Attack defense method and device, IOT (Internet of Things) device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0050] In the first embodiment of the present invention, an attack defense method is applied to Internet of Things devices, such as figure 1 As shown, the method includes the following specific steps:

[0051] Step S101, when the communication data is received, perform feature matching on the communication data and each attack data stored in the preset database.

[0052] In this embodiment, the number of preset databases is not specifically limited, and the number of preset databases is one or more.

[0053] In this embodiment, the way of matching the communication data with each attack data stored in the preset database includes but not limited to: according to the LDA (Linear Discriminant Analysis, linear discriminant analysis) algorithm, the communication data and the preset Each attack data stored in the configuration database is used for feature matching.

[0054]By performing feature matching on the communication data and each attack data stored in the preset database,...

no. 2 example

[0062] In the second embodiment of the present invention, an attack defense method is applied to IoT devices, such as figure 2 As shown, the method includes the following specific steps:

[0063] Step S201, when the communication data is received, LDA matching analysis is performed on the communication data and each attack data stored in the preset database, so as to determine whether the characteristics of the communication data match any attack data in the preset database.

[0064] LDA is used to classify and match the communication data with each attack data stored in the preset database. The degree of coupling between classifications is low, and the degree of aggregation within the classification is high. It can effectively and quickly identify whether the communication data is attack data, and improve the accuracy of attack data. Recognition efficiency and recognition speed.

[0065] Step S202, when the communication data matches the characteristics of any attack data i...

no. 3 example

[0067] In the third embodiment of the present invention, an attack defense method is applied to IoT devices, such as image 3 As shown, the method includes the following specific steps:

[0068] Step S304, when the communication data is received, perform LDA matching analysis on the communication data and each attack data stored in the preset database, so as to judge whether the communication data matches the characteristics of any attack data in the preset database.

[0069] Step S305, when the communication data matches the characteristics of any attack data in the preset database, perform security defense processing according to the preset attack response strategy corresponding to any attack data stored in the preset database.

[0070] In this embodiment, the attack defense method further includes:

[0071] Step S301, according to the preset attack data derivation configuration strategy, derivation processing is performed on each attack data stored in the preset database t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack defense method, and the method comprises the steps: performing the feature matching of the communication data with each piece of attack data stored in a preset database; and performing the security defense processing according to a preset attack coping strategy corresponding to any one piece of attack data stored in the preset database under the condition that thecommunication data is matched in features with any piece of attack data stored in the preset database. The invention also discloses an attack defense device, an IOT (Internet of Things) device and a computer readable storage medium. By implementing the above solution, the capability of the IOT device to respond to an attack is effectively improved, and the self-healing capability of the IOT deviceis effectively improved after being attacked.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, and in particular to an attack defense method and device, an Internet of Things device, and a computer-readable storage medium. Background technique [0002] With the continuous development of IoT technology and the continuous introduction of new IoT products, major organizations have launched IoT protocols and frameworks. The main problem solved by these IoT protocols and frameworks is the interconnection and intercommunication problem between IoT devices, that is, the connection and communication problems between IoT devices. When these IoT protocols and frameworks are to be put into application, the first problem to be faced is the security issue, and the security solutions of the existing IoT protocols and frameworks are all in their infancy, with weak ability to deal with attacks and self-healing ability. poor. Contents of the invention [0003] The present inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 梁海山赵峰徐志方刘超尹德帅崔九梅茹昭
Owner QINGDAO HAIER TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products