CN119766556B - A distributed data security protection system based on Internet of Things nodes - Google Patents
A distributed data security protection system based on Internet of Things nodesInfo
- Publication number
- CN119766556B CN119766556B CN202411963373.9A CN202411963373A CN119766556B CN 119766556 B CN119766556 B CN 119766556B CN 202411963373 A CN202411963373 A CN 202411963373A CN 119766556 B CN119766556 B CN 119766556B
- Authority
- CN
- China
- Prior art keywords
- data
- unit
- node
- security
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of network data security, in particular to a distributed data security protection system based on an Internet of things node, which comprises a security negotiation module, a dynamic encryption module, an identity authentication module, a data integrity detection module and an intrusion detection module; the system comprises a security negotiation module, a dynamic encryption module, an identity authentication module, a data integrity detection module and an intrusion detection module, wherein the security negotiation module is used for dynamically selecting an encryption algorithm, an authentication mechanism and a data transmission strategy, the dynamic encryption module is used for conducting encryption processing on transmitted data, the identity authentication module is used for conducting identity verification among nodes, the data integrity detection module is used for conducting integrity verification on the transmitted data, the intrusion detection module is used for analyzing and identifying potential security threats in real time, and the security of data transmission among the nodes of the Internet of things and the overall protection capability of the system are improved by dynamically selecting the encryption algorithm, the authentication mechanism and the data transmission strategy and combining the real-time intrusion detection and threat identification.
Description
Technical Field
The invention relates to the technical field of network data security, in particular to a distributed data security protection system based on an Internet of things node.
Background
Along with the rapid development of internet of things (IoT) technology, the number of nodes and communication scale of the internet of things are continuously increased, so that huge data exchange demands are brought, however, the high-degree distribution and isomerism of the internet of things environment and the safety instability of equipment make the traditional network safety protection technology difficult to meet the safety demands in the data transmission and communication process, the internet of things nodes carry out data transmission through a wireless network, the transmission process faces safety threats such as data theft, malicious attack, illegal access and the like, particularly in complex distributed environments, the problems of identity authentication, data encryption, data integrity guarantee and the like of the nodes are more prominent, in addition, the internet of things nodes generally have the limitation of calculation and storage capacity, and on the premise of guaranteeing high-efficiency performance, the confidentiality, the integrity and the usability of the network of the data are key problems to be solved in the internet of things safety field.
Although some safety protection systems based on the nodes of the internet of things exist in the prior art, the problems that on one hand, the traditional encryption algorithm and authentication mechanism are often based on fixed rules and configurations and are difficult to adapt to the dynamically-changed network environment and the diversified demands of the nodes in the internet of things, on the other hand, the existing system usually adopts a centralized or fixedly-configured safety strategy, and cannot flexibly adjust safety measures, so that certain nodes cannot be timely and effectively ensured under specific conditions, and in addition, the problems of low response speed, inaccurate threat identification and the like also exist in the aspects of intrusion detection and abnormal traffic identification.
Disclosure of Invention
Based on the above purpose, the invention provides a distributed data security protection system based on the nodes of the Internet of things.
The distributed data security protection system based on the Internet of things node comprises a security negotiation module, a dynamic encryption module, an identity authentication module, a data integrity detection module and an intrusion detection module, wherein:
the security negotiation module is configured on each node of the Internet of things, and is used for dynamically selecting an encryption algorithm, an authentication mechanism and a data transmission strategy according to the real-time security state and the network environment of the nodes when communication connection is established between the nodes, and generating corresponding security configuration parameters;
The dynamic encryption module is connected with the security negotiation module and used for receiving the security configuration parameters and carrying out encryption processing on the transmitted data according to the node characteristic information and the current network state;
the identity authentication module is used for carrying out identity authentication among the nodes, verifying the legitimacy of the nodes and determining the access authority of the nodes, and ensuring that only authorized nodes can participate in data exchange;
The data integrity detection module is used for carrying out integrity check on the data in transmission and verifying whether the data is tampered or not by generating hash values and signature information of the data;
and the intrusion detection module is used for monitoring the communication flow of the nodes of the Internet of things, analyzing and identifying potential security threats in real time so as to prevent the intrusion behavior from affecting the system.
Optionally, the security negotiation module includes a security state monitoring unit, a network environment monitoring unit, a policy selection unit, and a configuration parameter generation unit, where:
The security state monitoring unit is used for monitoring the security state of each node of the Internet of things in real time, including the authentication state of the node and the system load condition;
the network environment monitoring unit is used for monitoring current network environment parameters including network bandwidth, delay and node connection quality;
the strategy selection unit dynamically selects an encryption algorithm, an authentication mechanism and a data transmission strategy based on the data provided by the security state monitoring unit and the network environment analysis unit so as to meet the security requirements among different nodes;
and the configuration parameter generating unit is used for generating corresponding security configuration parameters according to the selection result of the strategy selection unit and transmitting the security configuration parameters to the dynamic encryption module and the identity authentication module.
Optionally, the policy selection unit includes:
selecting an AES symmetric encryption algorithm with low computational complexity if the network bandwidth is less than 10Mbps and the node load is greater than 80%, and selecting an RSA asymmetric encryption algorithm with high encryption strength if the network bandwidth is greater than 100Mbps and the node load is less than 50%;
selecting an authentication mechanism based on public key infrastructure if the authentication state of the node is normal and the system load is less than 50%, and selecting an authentication mechanism based on a shared key if the node load is greater than 80%;
And selecting a data transmission strategy, namely selecting a lossless transmission strategy and using a TCP protocol to transmit data if the network delay is less than 50ms and the bandwidth is greater than 100Mbps, and selecting a transmission strategy with strong fault tolerance and using a UDP protocol and a retransmission mechanism if the network delay is greater than 200ms or the bandwidth is less than 10 Mbps.
Optionally, the dynamic encryption module comprises an encryption algorithm selection unit, a key management unit and a data encryption processing unit, wherein:
The encryption algorithm selection unit is used for selecting an encryption algorithm according to the node characteristic information and the current network state, wherein the encryption algorithm comprises a symmetric encryption algorithm AES and an asymmetric encryption algorithm RSA;
the key management unit is used for generating a corresponding encryption key according to the selected encryption algorithm;
And the data encryption processing unit is used for encrypting the data to be transmitted by using the encryption algorithm selected by the encryption algorithm selection unit and the key generated by the key management unit, so as to ensure confidentiality and integrity of the data in the transmission process.
Optionally, the identity authentication module comprises an identity authentication unit, a right management unit, an access control unit and a log recording unit, wherein:
The identity verification unit is used for receiving the identity information from the communication node, verifying the validity of the communication node by comparing the identity information with a prestored legal identity database, and ensuring that only the legal node can pass identity verification;
The authority management unit is used for consulting the authority database according to the verification result of the identity verification unit, determining the access authority level of the communication node and generating a corresponding authority control strategy;
the access control unit is used for dynamically adjusting the access authority of the communication node according to the authority control strategy generated by the authority management unit, so that the node can only access the authorized resources and functions;
and the log recording unit is used for recording all operation logs of authentication and authority management, including authentication requests, authentication results and authority allocation conditions of the nodes.
Optionally, the rights management unit includes:
the authority inquiry, namely searching authority data matched with the node identity in an authority database according to the identity verification result, and acquiring a preset authority level and an access resource range of the node;
The authority control strategy is generated by generating a complete access authority control strategy to allow the node to access all system resources if the node identity is legal and the authority level is an administrator, generating a limited access authority control strategy to only allow the node to access the appointed system resources if the node identity is legal and the authority level is a user, and refusing access if the node identity fails to verify or the authority level is not authority.
Optionally, the data integrity detection module includes a hash value generation unit, a signature generation unit, a data receiving unit, a hash value verification unit, a signature verification unit, and a tamper detection unit, wherein:
The hash value generation unit is used for receiving the data to be transmitted and generating a hash value of the data by using a hash algorithm of SHA-256;
the signature generation unit is used for carrying out signature processing on the data by using the generated hash value and a prestored private key before data transmission to generate a digital signature of the data;
the data receiving unit is used for receiving the data transmitted by the node of the Internet of things and the digital signature attached to the data, and the received data comprises the original data and the signature information generated by the signature generating unit;
the hash value verification unit is used for recalculating the hash value of the received data and comparing the hash value with the received hash value, and if the comparison result is consistent, the data is not tampered, and if the comparison result is inconsistent, the data is tampered;
the signature verification unit is used for verifying the signature by combining the received data and the digital signature attached to the received data with the stored public key to judge whether the data is tampered;
And the tamper detection unit is used for generating alarm information and triggering safety response when detecting that the data is tampered according to the results of the hash value verification unit and the signature verification unit, and preventing the data from being continuously transmitted or notifying a system administrator.
Optionally, the signature verification unit includes:
calculating a hash value of the received data by using a hash algorithm of SHA-256, wherein the formula is H (P) =sha-256 (P), wherein H (P) is the hash value of the data P;
Decrypting the extracted digital signature by using the public key to obtain a hash value used in signing, wherein the expression is H Signing = decryption (signature, public key);
comparing whether the calculated hash value H (P) is consistent with the hash value H Signing obtained by decryption, wherein the formula is as follows:
And judging tampering, namely confirming that the data is not tampered if the verification result is valid, allowing the data to continue to be transmitted and processed, and triggering corresponding safety response if the verification result is invalid and judging that the data is tampered.
Optionally, the intrusion detection module comprises a flow monitoring unit, a feature extraction unit, a threat identification unit and an alarm generation unit, wherein:
the flow monitoring unit is used for continuously monitoring communication flow among the nodes of the Internet of things and collecting metadata and content information of the data packet, wherein the metadata and the content information comprise a source address, a destination address, a port number, a protocol type, the size of the data packet and a transmission rate;
the feature extraction unit is used for extracting features from the monitored communication traffic and transmitting the extracted features to the threat identification unit;
The threat identification unit is used for classifying and analyzing the extracted feature vectors by utilizing a decision tree algorithm and identifying potential security threats;
And the alarm generation unit is used for generating and recording safety alarm information and sending alarm notification to a system administrator when the threat identification unit detects the safety threat.
Optionally, the threat identification unit includes:
receiving the feature vector, namely receiving the feature vector from the feature extraction unit and carrying out normalization processing;
Inputting the received feature vector into a pre-trained decision tree model, making a layer-by-layer decision according to each attribute value in the feature vector, and determining whether the data packet has security threat;
The decision tree model sequentially compares the characteristic values with the node segmentation values from the root node according to a predefined decision rule based on the attribute values of the characteristic vectors, and traverses downwards along the corresponding branch paths until the leaf nodes are reached, so that whether the data packet is a potential safety threat is judged in a classified mode;
and determining the threat type, namely determining the specific threat type of the data packet according to the classification label of the leaf node after the leaf node is reached.
The invention has the beneficial effects that:
The dynamic adaptability effectively solves the problems of fixed encryption configuration and inflexible authentication mechanism in the traditional internet of things security system, and can automatically select the most suitable security configuration according to the real-time security state of the node and the network environment to ensure the confidentiality and integrity of data in the transmission process.
According to the method, the device and the system, the communication flow of the nodes of the Internet of things is continuously monitored, the characteristics of the data packets are analyzed in real time, the potential security threat is identified, various attack behaviors can be accurately classified by combining a decision tree algorithm, corresponding security alarm information is generated, and malicious attack or unauthorized access behaviors are effectively prevented.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only of the invention and that other drawings can be obtained from them without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a distributed data security system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an intrusion detection module according to an embodiment of the invention.
Detailed Description
The invention will now be described in detail with reference to the drawings and to specific embodiments. While the invention has been described herein in detail in order to make the embodiments more detailed, the following embodiments are preferred and can be embodied in other forms as well known to those skilled in the art, and the accompanying drawings are only for the purpose of describing the embodiments more specifically and are not intended to limit the invention to the specific forms disclosed herein.
It should be noted that references in the specification to "one embodiment," "an example embodiment," "some embodiments," etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the relevant art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
Generally, the terminology may be understood, at least in part, from the use of context. For example, the term "one or more" as used herein may be used to describe any feature, structure, or characteristic in a singular sense, or may be used to describe a combination of features, structures, or characteristics in a plural sense, depending at least in part on the context. In addition, the term "based on" may be understood as not necessarily intended to convey an exclusive set of factors, but may instead, depending at least in part on the context, allow for other factors that are not necessarily explicitly described.
1-2, The distributed data security protection system based on the Internet of things node comprises a security negotiation module, a dynamic encryption module, an identity authentication module, a data integrity detection module and an intrusion detection module, wherein:
the security negotiation module is configured on each node of the Internet of things, and is used for dynamically selecting an encryption algorithm, an authentication mechanism and a data transmission strategy according to the real-time security state and the network environment of the nodes when communication connection is established between the nodes, and generating corresponding security configuration parameters;
The dynamic encryption module is connected with the security negotiation module and is used for receiving the security configuration parameters and carrying out encryption processing on the transmitted data according to the node characteristic information and the current network state, wherein the encryption processing comprises the selection of a proper encryption algorithm and a proper key length;
the identity authentication module is used for carrying out identity authentication among the nodes, verifying the legitimacy of the nodes and determining the access authority of the nodes, and ensuring that only authorized nodes can participate in data exchange;
The data integrity detection module is used for carrying out integrity check on the data in transmission and verifying whether the data is tampered or not by generating hash values and signature information of the data;
and the intrusion detection module is used for monitoring the communication flow of the nodes of the Internet of things, analyzing and identifying potential security threats in real time so as to prevent the intrusion behavior from affecting the system.
The security negotiation module comprises a security state monitoring unit, a network environment monitoring unit, a strategy selection unit and a configuration parameter generation unit, wherein:
The security state monitoring unit is used for monitoring the security state of each node of the Internet of things in real time, including the authentication state of the node and the system load condition;
the network environment monitoring unit is used for monitoring current network environment parameters including network bandwidth, delay and node connection quality;
the strategy selection unit dynamically selects an encryption algorithm, an authentication mechanism and a data transmission strategy based on the data provided by the security state monitoring unit and the network environment analysis unit so as to meet the security requirements among different nodes;
The configuration parameter generation unit is used for generating corresponding security configuration parameters according to the selection result of the strategy selection unit, transmitting the security configuration parameters to the dynamic encryption module and the identity authentication module to guide the subsequent data encryption processing and the identity authentication process, and through the design, the security negotiation module can dynamically select a proper encryption algorithm, authentication mechanism and data transmission strategy according to the real-time security state and network environment of the node of the Internet of things, and generate corresponding security configuration parameters.
The policy selection unit includes:
selecting an AES symmetric encryption algorithm with low computational complexity if the network bandwidth is less than 10Mbps and the node load is greater than 80%, and selecting an RSA asymmetric encryption algorithm with high encryption strength if the network bandwidth is greater than 100Mbps and the node load is less than 50%;
Selecting an authentication mechanism based on Public Key Infrastructure (PKI) if the authentication state of the node is normal and the system load is less than 50%, and selecting an authentication mechanism based on a shared key, such as HMAC (Hash-based message authentication code), if the node load is more than 80%;
The data transmission strategy selection comprises the steps of selecting a lossless transmission strategy and using a TCP protocol to carry out data transmission if the network delay is less than 50ms and the bandwidth is greater than 100Mbps, selecting a transmission strategy with strong fault tolerance if the network delay is greater than 200ms or the bandwidth is less than 10Mbps, combining a UDP protocol with a retransmission mechanism to ensure the reliability of data, intelligently selecting a proper encryption algorithm, an authentication mechanism and a data transmission strategy according to the network state, the node load and the security requirement monitored in real time by a strategy selection unit through the design, and ensuring that a system can operate efficiently under different network conditions and loads by the dynamic adjustment mechanism and simultaneously providing strong data protection capability.
The dynamic encryption module comprises an encryption algorithm selection unit, a key management unit and a data encryption processing unit, wherein:
An encryption algorithm selection unit for selecting an encryption algorithm according to the node characteristic information and the current network state, wherein the encryption algorithm comprises a symmetric encryption algorithm AES (advanced encryption standard) and an asymmetric encryption algorithm RSA (Rivest-Shamir-Adleman);
The key management unit is used for generating a corresponding encryption key according to the selected encryption algorithm and is responsible for distributing, storing and periodically updating the key so as to ensure the security and effectiveness of the key;
The dynamic encryption module can intelligently select the most suitable encryption algorithm and effectively manage the encryption key according to the characteristic information and the real-time network state of the node of the Internet of things, thereby realizing efficient and safe data encryption processing.
The identity authentication module comprises an identity authentication unit, a right management unit, an access control unit and a log recording unit, wherein:
The identity verification unit is used for receiving the identity information from the communication node, verifying the validity of the communication node by comparing the identity information with a prestored legal identity database, and ensuring that only the legal node can pass identity verification;
The authority management unit is used for consulting the authority database according to the verification result of the identity verification unit, determining the access authority level of the communication node and generating a corresponding authority control strategy;
the access control unit is used for dynamically adjusting the access authority of the communication node according to the authority control strategy generated by the authority management unit, so that the node can only access the authorized resources and functions;
And the log recording unit is used for recording all operation logs of identity verification and authority management, including the identity verification request, the verification result and the authority distribution condition of the node, so as to facilitate subsequent audit and tracing.
The rights management unit includes:
the authority inquiry, namely searching authority data matched with the node identity in an authority database according to the identity verification result, and acquiring a preset authority level and an access resource range of the node;
The authority control strategy generation method comprises the steps of generating a complete access authority control strategy to allow nodes to access all system resources if node identities are legal and authority levels are administrators, generating a limited access authority control strategy to only allow the nodes to access specified system resources if the node identities are legal and the authority levels are users, refusing access if the node identities are failed or the authority levels are not authority, and generating a flexible and dynamic authority control strategy according to the identity verification result of the nodes, data in an authority database and real-time network conditions by the aid of the authority management unit, wherein the strategy generation mechanism ensures that the nodes can obtain proper access authorities according to actual requirements under different scenes, and the access of the nodes to the system resources is effectively controlled.
The data integrity detection module comprises a hash value generation unit, a signature generation unit, a data receiving unit, a hash value verification unit, a signature verification unit and a tamper detection unit, wherein:
The hash value generation unit is used for receiving the data to be transmitted and generating a hash value of the data by using a hash algorithm of SHA-256, wherein the hash value is a unique representation of the data, any tiny data change can cause the change of the hash value, and the integrity of the data is ensured;
the signature generation unit is used for carrying out signature processing on the data by using the generated hash value and a prestored private key before data transmission to generate a digital signature of the data, wherein the signature can be used for verifying the integrity of the data and ensuring that the data is not tampered;
the data receiving unit is used for receiving the data transmitted by the node of the Internet of things and the digital signature attached to the data, and the received data comprises the original data and the signature information generated by the signature generating unit;
the hash value verification unit is used for recalculating the hash value of the received data and comparing the hash value with the received hash value, and if the comparison result is consistent, the data is not tampered, and if the comparison result is inconsistent, the data is tampered;
the signature verification unit is used for verifying the signature by combining the received data and the digital signature attached to the received data with the stored public key to judge whether the data is tampered;
The tamper detection unit is used for generating alarm information and triggering safety response when detecting that the data is tampered according to the results of the hash value verification unit and the signature verification unit, and the tamper detection unit comprises the step of preventing the data from being continuously transmitted or notifying a system administrator; through the design, the data integrity detection module realizes strict verification of the integrity of transmission data through the hash value and digital signature technology, ensures that the data is not tampered in the transmission process, provides an effective data verification mechanism for the hash value generation unit and the signature generation unit, ensures the validity and the integrity of the data, can timely discover the data tampering behavior, triggers corresponding safety response and effectively ensures the safety and the reliability of the data in the Internet of things system.
The signature verification unit includes:
calculating a hash value of the received data by using a hash algorithm of SHA-256, wherein the formula is H (P) =sha-256 (P), wherein H (P) is the hash value of the data P;
Decrypting the extracted digital signature by using a public key to obtain a hash value used in signing, wherein the expression is H Signing = decryption (signature, public key);
comparing whether the calculated hash value H (P) is consistent with the hash value H Signing obtained by decryption, wherein the formula is as follows:
The method comprises the steps of judging whether data are tampered or not, allowing the data to be continuously transmitted and processed if the verification result is valid, judging that the data are tampered and triggering corresponding safety response if the verification result is invalid, and carrying out strict signature verification by combining the received data and the digital signature attached to the received data with the stored public key through the design by the strategy selection unit, so that whether the data are tampered or not is accurately judged in the transmission process, wherein the mechanism ensures the integrity and the source credibility of the data, and prevents the influence of malicious tampering actions on a system.
The intrusion detection module comprises a flow monitoring unit, a feature extraction unit, a threat identification unit and an alarm generation unit, wherein:
the flow monitoring unit is used for continuously monitoring communication flow among the nodes of the Internet of things and collecting metadata and content information of the data packet, wherein the metadata and the content information comprise a source address, a destination address, a port number, a protocol type, the size of the data packet and a transmission rate;
The feature extraction unit is used for extracting features such as the transmission rate and the size of a data packet, the frequency of the packet and the change trend of the frequency of the packet from the monitored communication traffic and transmitting the extracted features to the threat identification unit;
The threat identification unit is used for classifying and analyzing the extracted feature vectors by utilizing a decision tree algorithm and identifying potential security threats;
the system comprises a threat identification unit, an alarm generation unit, an intrusion detection module and a decision tree algorithm, wherein the threat identification unit is used for identifying the security threat, generating and recording security alarm information and sending alarm notification to a system administrator when the threat identification unit detects the security threat, the intrusion detection module is used for comprehensively monitoring and analyzing the communication flow between the nodes of the Internet of things and accurately identifying the potential security threat by utilizing the decision tree algorithm, and once the threat is detected, the alarm generation unit is used for timely generating and recording the alarm information and notifying the system administrator to take corresponding measures, so that the intrusion behavior is effectively prevented and dealt with, and the overall security protection capability of the system is improved.
The threat identification unit includes:
receiving the feature vector, namely receiving the feature vector from the feature extraction unit and carrying out normalization processing;
Inputting the received feature vector into a pre-trained decision tree model, making a layer-by-layer decision according to each attribute value in the feature vector, and determining whether the data packet has security threat;
The decision tree model sequentially compares the characteristic values with the node segmentation values from the root node according to a predefined decision rule based on the attribute values of the characteristic vectors, and traverses downwards along the corresponding branch paths until the leaf nodes are reached, so that whether the data packet is a potential safety threat is judged in a classified mode;
The predefined decision rules include:
rule 1 if the source address of the data packet is an IP address in the blacklist and the transmission rate exceeds 1000 packets/second, classifying the data packet as a "denial of service attack (DoS)";
Rule 2 if the protocol type of the packet is an abnormal protocol (non-standard protocol) and the port number is a high risk port (e.g., 8080), classifying the packet as "malware propagation";
Rule 3, if the data packet size of the data packet is smaller than 50 bytes and the transmission rate suddenly increases, classifying the data packet as "information leakage attempt";
rule 4, if the source address and the destination address of the data packet change frequently and the system load is higher than 80%, classifying the data packet as a 'man-in-the-middle attack';
Rule 5, if the source address and the destination address of the data packet are both internal network addresses, but the protocol type is an external suspicious protocol, classifying the data packet as an internal threat;
Rule 6, if the transmission rate of the data packet exceeds twice the normal level and the size of the data packet continuously fluctuates, classifying the data packet as an 'abnormal traffic mode';
Rule 7, if the source address of the data packet comes from an unauthorized geographic area and the protocol type is a high risk protocol, classifying the data packet as a geographic location anomaly attack;
Rule 8, if the source address of the data packet is known malicious IP and the protocol type is standard protocol, classifying the data packet as 'known malicious activity';
Rule 9, if the data packet size of the data packet is continuously increased and the transmission rate is kept stable, classifying the data packet as a 'data packet expansion attack';
rule 10. If the source address and destination address of the packet match a particular attack pattern (e.g., a scan attack), classifying the packet as a "scan attack";
and determining the threat type, namely determining the specific threat type of the data packet according to the classification label of the leaf node after the leaf node is reached.
The decision tree model application step comprises the following steps:
step 1, according to each attribute value in the feature vector, applying predefined decision rules (rule 1 to rule 10) one by one, and judging whether the data packet accords with the feature condition of a specific threat type;
Step 2, classifying the data packet into corresponding threat types once the data packet accords with the condition of a certain rule, and stopping matching of the further rule;
And 3, if the data packet accords with the conditions of a plurality of rules, selecting the most serious threat type for classification according to a preset priority order, and by the design, the threat identification unit can realize efficient and accurate security threat monitoring and identification in the environment of the Internet of things, thereby remarkably improving the security protection level of the whole data and ensuring the reliable operation of the system of the Internet of things.
The invention is intended to cover any alternatives, modifications, equivalents, and variations that fall within the spirit and scope of the invention. In the following description of preferred embodiments of the invention, specific details are set forth in order to provide a thorough understanding of the invention, and the invention will be fully understood to those skilled in the art without such details. In other instances, well-known methods, procedures, flows, components, circuits, and the like have not been described in detail so as not to unnecessarily obscure aspects of the present invention.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411963373.9A CN119766556B (en) | 2024-12-30 | 2024-12-30 | A distributed data security protection system based on Internet of Things nodes |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411963373.9A CN119766556B (en) | 2024-12-30 | 2024-12-30 | A distributed data security protection system based on Internet of Things nodes |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN119766556A CN119766556A (en) | 2025-04-04 |
| CN119766556B true CN119766556B (en) | 2025-09-23 |
Family
ID=95189122
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411963373.9A Active CN119766556B (en) | 2024-12-30 | 2024-12-30 | A distributed data security protection system based on Internet of Things nodes |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119766556B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116010888A (en) * | 2022-12-29 | 2023-04-25 | 山石网科通信技术股份有限公司 | Flow detection method and device, computer storage medium and electronic device |
| CN118631570A (en) * | 2024-07-03 | 2024-09-10 | 广州东兆信息科技有限公司 | A trusted authentication method and system for mobile terminal equipment based on the Internet of Things |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117131484A (en) * | 2023-08-16 | 2023-11-28 | 深圳奥联信息安全技术有限公司 | Dynamic encryption method, system, computer equipment and storage medium |
| CN117792603B (en) * | 2023-12-26 | 2024-06-18 | 山东展望信息科技股份有限公司 | Internet of things data secure sharing method and system |
| CN118590263A (en) * | 2024-05-14 | 2024-09-03 | 重庆高新技术产业研究院有限责任公司 | Industrial Internet security protection system and method |
-
2024
- 2024-12-30 CN CN202411963373.9A patent/CN119766556B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116010888A (en) * | 2022-12-29 | 2023-04-25 | 山石网科通信技术股份有限公司 | Flow detection method and device, computer storage medium and electronic device |
| CN118631570A (en) * | 2024-07-03 | 2024-09-10 | 广州东兆信息科技有限公司 | A trusted authentication method and system for mobile terminal equipment based on the Internet of Things |
Also Published As
| Publication number | Publication date |
|---|---|
| CN119766556A (en) | 2025-04-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115189927B (en) | A zero-trust-based power network security protection method | |
| CN118433704B (en) | Mobile office data security access system based on encrypted mirror image transmission | |
| US8806572B2 (en) | Authentication via monitoring | |
| EP4236206B1 (en) | Actively monitoring encrypted traffic by inspecting logs | |
| CN118944982B (en) | A data security transmission method based on encryption algorithm | |
| CN116192497B (en) | Network access and user authentication safe interaction method based on zero trust system | |
| CN117155609A (en) | Internet of things access scene identity modeling and access control method | |
| CN120017424B (en) | A method and system for secure access to encrypted enterprise network data | |
| KR20130085473A (en) | Encryption system for intrusion detection system of cloud computing service | |
| Neu et al. | An approach for detecting encrypted insider attacks on OpenFlow SDN Networks | |
| Venkatesan et al. | Analysis of accounting models for the detection of duplicate requests in web services | |
| CN119485284A (en) | A secure access method for Internet of Things devices based on mobile communication network | |
| CN117560230B (en) | Network data transmission encryption type data transmission method | |
| CN117061556B (en) | Remote operation and maintenance safety protection device for power monitoring system | |
| CN119766556B (en) | A distributed data security protection system based on Internet of Things nodes | |
| CN115297481B (en) | A 5G MEC security assessment system and method | |
| CN117749476A (en) | Trusted secure connection method and device based on encryption algorithm and electronic equipment | |
| US12069070B2 (en) | Systems and methods for early detection, warning and prevention of cyber threats | |
| Kalangi et al. | A hybrid IP trace back mechanism to pinpoint the attacker | |
| Choudhary et al. | Detection and Isolation of Zombie Attack under Cloud Computing | |
| CN115664771B (en) | A method and system for security monitoring of intelligent terminals participating in flexible resource aggregation and regulation | |
| CN120342741A (en) | Cloud architecture distributed data processing method, device, equipment and storage medium | |
| Kaskar et al. | A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set | |
| Tang et al. | Research on security protection countermeasures of internet of things | |
| CN119676001B (en) | Data encryption transmission method and device with early warning mechanism |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |