技术领域Technical Field
本发明属于物联网安全防护技术领域,尤其涉及一种异构物联网接入安全防护装置及方法。The present invention belongs to the technical field of Internet of Things security protection, and in particular relates to a heterogeneous Internet of Things access security protection device and method.
背景技术Background technique
物联网网关作为物联网终端和传统通信网络之间数据和信息传输的纽带,需要解决各种异构物联网终端接口的接入、各种异构物联网应用协议的适配以及各种物联网感知数据的汇聚和发送,在整个物联网应用中扮演了非常重要的作用,参照图1,如图1所示是传统物联网网关异构接入示意图。As the link for data and information transmission between IoT terminals and traditional communication networks, IoT gateways need to solve the access of various heterogeneous IoT terminal interfaces, the adaptation of various heterogeneous IoT application protocols, and the aggregation and transmission of various IoT perception data. They play a very important role in the entire IoT application. Referring to Figure 1, Figure 1 is a schematic diagram of heterogeneous access of traditional IoT gateways.
传统的物联网网关异构接入处理方式是,针对各种物联网终端异构接口进行接口处理,分别提取出各种异构终端发送的感知数据,经过数据汇聚处理后,再根据策略进行本地存储和封装发送。但这种传统方式,物联网网关对所有的物联网终端身份和数据都无条件信任,攻击者容易发起假冒终端、假冒数据等攻击,安全隐患较大。而要进行安全增强,面临以下挑战:The traditional way of processing heterogeneous access of IoT gateways is to process the interface of various IoT terminal heterogeneous interfaces, extract the perception data sent by various heterogeneous terminals respectively, and then store and encapsulate the data locally according to the policy after data aggregation and processing. However, in this traditional way, the IoT gateway unconditionally trusts the identities and data of all IoT terminals, and attackers can easily launch attacks such as fake terminals and fake data, which poses a great security risk. To enhance security, we face the following challenges:
(1)传统方式是从应用层提取出数据信息后进行汇聚,没有从网络层进行汇聚处理,物联网终端身份标识、网络流量特征信息等安全特征,在数据层面均无法获取;(1) The traditional method is to extract data information from the application layer and then aggregate it, without aggregating it from the network layer. Therefore, security features such as IoT terminal identity and network traffic feature information cannot be obtained at the data level.
(2)如果要新增终端身份鉴别、网络流量特征分析等安全功能,需要针对各个接口及协议进行单独处理,安全的代价较大,不利于物联网网关产业链资源的整合。(2) If new security functions such as terminal identity authentication and network traffic feature analysis are to be added, each interface and protocol needs to be processed separately, which has a high security cost and is not conducive to the integration of IoT gateway industry chain resources.
因此,迫切需要突破面向异构物联网接入手段的网络层归一化处理方法,以便于安全功能的部署,并降低安全功能的定制实现代价,支撑面向关键行业的物联网应用。Therefore, there is an urgent need to break through the network layer normalization processing method for heterogeneous IoT access methods to facilitate the deployment of security functions and reduce the cost of customized implementation of security functions to support IoT applications for key industries.
发明内容Summary of the invention
本发明的目的在于,为克服现有技术缺陷,提供了一种异构物联网接入安全防护装置及方法, 在网络层完成对异构物联网终端的汇聚接入,能够以较低代价实现终端身份鉴别和网络流量特征分析等安全功能,能够有效防止假冒终端、假冒数据进入物联网网关,以满足关键行业对物联网应用的高安全需求。The purpose of the present invention is to overcome the defects of the prior art and provide a heterogeneous Internet of Things access security protection device and method, which completes the converged access of heterogeneous Internet of Things terminals at the network layer, can realize security functions such as terminal identity authentication and network traffic feature analysis at a low cost, and can effectively prevent fake terminals and fake data from entering the Internet of Things gateway, so as to meet the high security requirements of key industries for Internet of Things applications.
本发明目的通过下述技术方案来实现:The object of the present invention is achieved through the following technical solutions:
一种异构物联网接入安全防护装置,所述装置包括:A heterogeneous Internet of Things access security protection device, the device comprising:
异构协议转换模块,所述异构协议转换模块将非IP的异构数据流量转换成基于IP的统一网络流量;A heterogeneous protocol conversion module, which converts non-IP heterogeneous data traffic into IP-based unified network traffic;
网络流量特征提取模块,所述网络流量特征提取模块基于所述统一网络流量进行网络流量特征分析提取,形成设备特征指纹并对进行身份鉴别和特征匹配判决,根据身份鉴别结果和特征匹配判决结果,向访问控制模块下发安全策略;A network traffic feature extraction module, which performs network traffic feature analysis and extraction based on the unified network traffic, forms a device feature fingerprint, performs identity authentication and feature matching judgment, and sends a security policy to the access control module based on the identity authentication result and feature matching judgment result;
网络汇聚模块,所述网络汇聚模块将所述统一网络流量进行汇聚处理;A network aggregation module, wherein the network aggregation module aggregates the unified network traffic;
访问控制模块,所述访问控制模块根据所述安全策略,对网络汇聚模块输出的网络流量进行访问控制,阻断异常网络流量;An access control module, wherein the access control module performs access control on the network traffic output by the network convergence module according to the security policy to block abnormal network traffic;
网络数据处理模块,所述网络数据处理模块基于所述安全策略,对汇聚的合法网络流量进行存储和转发操作。A network data processing module is used to store and forward the aggregated legal network traffic based on the security policy.
进一步的,所述装置还包括:Furthermore, the device also includes:
网络数据存储模块,所述网络数据存储模块对通过了访问控制的网络流量进行本地存储。A network data storage module is used to locally store network traffic that has passed access control.
另一方面,本发明还提供了一种异构物联网接入安全防护方法,所述方法基于前述任一种的异构物联网接入安全防护装置实现,所述方法包括:On the other hand, the present invention further provides a heterogeneous Internet of Things access security protection method, the method is implemented based on any of the aforementioned heterogeneous Internet of Things access security protection devices, and the method includes:
通过异构协议转换模块将接入的终端设备信息转换为标准IP网络报文;The connected terminal device information is converted into standard IP network messages through the heterogeneous protocol conversion module;
从所述标准IP网络报文中提取网络流量特征并进行身份鉴别和特征匹配判决,根据身份鉴别结果和特征匹配判决结果,向访问控制模块下发安全策略;Extract network traffic features from the standard IP network message and perform identity authentication and feature matching judgment, and issue security policies to the access control module based on the identity authentication results and feature matching judgment results;
访问控制模块根据所述安全策略对网络汇聚模块输出的网络流量进行访问控制,阻断异常网络流量,网络数据处理模块基于所述安全策略,对汇聚的合法网络流量进行存储和转发操作。The access control module performs access control on the network traffic output by the network aggregation module according to the security policy to block abnormal network traffic. The network data processing module performs storage and forwarding operations on the aggregated legal network traffic based on the security policy.
进一步的,所述通过异构协议转换模块将接入的终端设备信息转换为标准IP网络报文具体包括:Furthermore, the converting of the accessed terminal device information into a standard IP network message by the heterogeneous protocol conversion module specifically includes:
提取每个接入终端的设备信息,所述设备信息包括协议类型、表征设备ID的身份信息和感知数据信息;Extracting device information of each access terminal, the device information including protocol type, identity information representing device ID, and perception data information;
根据端口映射表,将所述协议类型映射成相应源端口号;According to the port mapping table, mapping the protocol type to a corresponding source port number;
根据地址映射运算规则,基于设备ID的身份信息运算生成源IP地址;According to the address mapping operation rules, the source IP address is generated based on the identity information of the device ID;
根据需求表单或者订阅规则,获取所述感知数据信息流向的物联网应用服务地址,以所述物联网应用服务地址作为目的IP地址,目的端口号与源端口号保持一致;According to the demand form or subscription rules, obtain the IoT application service address to which the perception data information flows, use the IoT application service address as the destination IP address, and keep the destination port number consistent with the source port number;
基于源端口号、源IP地址、目的端口号、目的IP地址以及感知数据信息封装成标准IP网络报文。Based on the source port number, source IP address, destination port number, destination IP address and perception data information, it is encapsulated into a standard IP network message.
进一步的,所述方法还包括:Furthermore, the method further comprises:
在提取每个接入终端的设备信息之前,事先规划异构协议与预留端口号之间的端口映射表,以及表征终端设备ID的信息与源IP地址之间转换的地址映射运算规则。Before extracting the device information of each access terminal, a port mapping table between heterogeneous protocols and reserved port numbers and an address mapping operation rule for converting between information representing the terminal device ID and the source IP address are planned in advance.
进一步的,所述从所述标准IP网络报文中提取网络流量特征并进行身份鉴别和特征匹配判决具体包括:Furthermore, the extracting of network traffic features from the standard IP network message and performing identity authentication and feature matching judgment specifically includes:
网络流量特征提取模块从网络汇聚模块获得镜像网络流量;The network traffic feature extraction module obtains the mirrored network traffic from the network aggregation module;
根据所述镜像网络流量分析得到源端口号、源IP地址和网络流量特征;Obtaining source port number, source IP address and network traffic characteristics according to the mirrored network traffic analysis;
通过源端口号、源IP地址完成终端身份鉴别,并通过对网络流量特征的持续性学习,按终端来源评估网络流量特征匹配度;The terminal identity is authenticated through the source port number and source IP address, and the matching degree of network traffic characteristics is evaluated according to the terminal source through continuous learning of network traffic characteristics;
根据终端身份鉴别结果以及网络流量特征匹配度,向访问控制模块下发安全策略。According to the terminal identity authentication results and the matching degree of network traffic characteristics, security policies are issued to the access control module.
进一步的,所述对网络汇聚模块输出的网络流量进行访问控制,阻断异常网络流量具体包括:Furthermore, the access control of the network traffic output by the network convergence module to block abnormal network traffic specifically includes:
访问控制模块实时匹配当前网络流量和安全策略;The access control module matches the current network traffic and security policies in real time;
对于不符合安全策略的网络流量,实施阻断处理并进行安全告警。For network traffic that does not comply with security policies, blocking is implemented and security alerts are issued.
本发明的有益效果在于:The beneficial effects of the present invention are:
本发明提出了一种面向异构物联网接入手段的网络层归一化处理方法和安全防护装置,能够在网络层完成对异构物联网终端的汇聚接入,能够以较低代价实现终端身份鉴别和网络流量特征分析等安全功能,能够有效防止假冒终端、假冒数据进入物联网网关,以满足关键行业对物联网应用的高安全需求。The present invention proposes a network layer normalization processing method and a security protection device for heterogeneous Internet of Things access means, which can complete the converged access of heterogeneous Internet of Things terminals at the network layer, can realize security functions such as terminal identity authentication and network traffic feature analysis at a relatively low cost, and can effectively prevent counterfeit terminals and counterfeit data from entering the Internet of Things gateway, so as to meet the high security requirements of key industries for Internet of Things applications.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是传统物联网网关异构接入示意图;Figure 1 is a schematic diagram of heterogeneous access of traditional IoT gateways;
图2是本发明实施例异构物联网接入安全防护装置示意图;FIG2 is a schematic diagram of a heterogeneous Internet of Things access security protection device according to an embodiment of the present invention;
图3是本发明实施例异构物联网接入安全防护装置在典型物联网应用的流程框图。FIG3 is a flowchart of a typical Internet of Things application of a heterogeneous Internet of Things access security protection device according to an embodiment of the present invention.
具体实施方式Detailed ways
以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。The following describes the embodiments of the present invention by specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and the details in this specification can also be modified or changed in various ways based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the following embodiments and features in the embodiments can be combined with each other without conflict.
基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without making any creative work shall fall within the scope of protection of the present invention.
传统的物联网网关异构接入处理方式是,针对各种物联网终端异构接口进行接口处理,分别提取出各种异构终端发送的感知数据,经过数据汇聚处理后,再根据策略进行本地存储和封装发送。但这种传统方式,物联网网关对所有的物联网终端身份和数据都无条件信任,攻击者容易发起假冒终端、假冒数据等攻击,安全隐患较大。The traditional way of processing heterogeneous access of IoT gateways is to perform interface processing on the heterogeneous interfaces of various IoT terminals, extract the perception data sent by various heterogeneous terminals respectively, and then store and encapsulate the data locally according to the strategy after data aggregation processing. However, in this traditional way, the IoT gateway unconditionally trusts the identities and data of all IoT terminals, and attackers can easily launch attacks such as fake terminals and fake data, which poses a great security risk.
为了解决上述技术问题,提出了本发明一种异构物联网接入安全防护装置及方法的下述各个实施例。In order to solve the above technical problems, the following embodiments of a heterogeneous Internet of Things access security protection device and method are proposed in the present invention.
实施例1Example 1
参照图2,如图2所示是本实施例异构物联网接入安全防护装置示意图。该装置包括异构协议转换模块、网络流量特征提取模块、网络汇聚模块、访问控制模块、网络数据处理模块以及网络数据存储模块等六个部分。Referring to Figure 2, a schematic diagram of the heterogeneous Internet of Things access security protection device of this embodiment is shown in Figure 2. The device includes six parts: a heterogeneous protocol conversion module, a network traffic feature extraction module, a network aggregation module, an access control module, a network data processing module, and a network data storage module.
具体地,异构协议转换模块负责与各种异构物联接入手段配合,将非IP的异构数据流量转换成基于IP的统一网络流量。Specifically, the heterogeneous protocol conversion module is responsible for cooperating with various heterogeneous IoT access methods to convert non-IP heterogeneous data traffic into unified IP-based network traffic.
网络流量特征提取模块基于转换获得的统一网络流量进行网络流量特征分析提取,形成设备特征指纹并进行判决,并将判决结果输出给访问控制模块。The network traffic feature extraction module performs network traffic feature analysis and extraction based on the unified network traffic obtained by conversion, forms device feature fingerprints and makes judgments, and outputs the judgment results to the access control module.
网络汇聚模块将各种异构协议转换后的统一网络流量进行汇聚处理;访问控制模块根据网络流量特征提取模块形成的判决结果,对网络汇聚模块输出的网络流量进行基于标准五元组的访问控制功能,阻断异常网络流量。The network convergence module aggregates and processes the unified network traffic after conversion of various heterogeneous protocols; the access control module performs standard five-tuple-based access control on the network traffic output by the network convergence module according to the judgment result formed by the network traffic feature extraction module, thereby blocking abnormal network traffic.
网络数据处理模块基于物联网网关策略,对汇聚的合法网络流量进行存储和转发操作。The network data processing module stores and forwards the aggregated legitimate network traffic based on the IoT gateway strategy.
网络流量存储模块对通过了访问控制的网络流量进行本地存储,一方面用于安全分析,一方面用于本地存储记录。The network traffic storage module locally stores the network traffic that has passed the access control, which is used for security analysis and local storage records.
将上述异构物联网接入安全防护装置用于安全防护时包括异构协议转换、网络流量特征提取和网络访问控制等三部分。When the above-mentioned heterogeneous Internet of Things is connected to the security protection device for security protection, it includes three parts: heterogeneous protocol conversion, network traffic feature extraction and network access control.
其中,异构协议转换的具体方法如下:The specific method of heterogeneous protocol conversion is as follows:
S0、事先规划异构协议与预留端口号之间的端口映射表,以及表征终端设备ID的信息与源IP地址之间转换的地址映射运算规则;S0, pre-planning the port mapping table between heterogeneous protocols and reserved port numbers, and the address mapping operation rules for converting between the information representing the terminal device ID and the source IP address;
S1、与各种接口处理模块配合,分析、识别并提取出相关接入终端的协议类型、表征设备ID的身份信息、感知数据信息;S1. Cooperate with various interface processing modules to analyze, identify and extract the protocol type of the relevant access terminal, the identity information representing the device ID, and the perception data information;
S2、根据端口映射表,将协议类型映射成相应源端口号;S2. Map the protocol type to the corresponding source port number according to the port mapping table;
S2、根据地址映射运算规则,基于设备ID的身份信息运算生成源IP地址;S2. Generate a source IP address based on the identity information of the device ID according to the address mapping operation rules;
S3、根据需求表单或者订阅规则,获取物联感知信息流向的物联网应用服务地址,以该物联网应用服务地址作为目的IP地址;S3. According to the demand form or subscription rules, obtain the IoT application service address to which the IoT sensing information flows, and use the IoT application service address as the destination IP address;
S4、目的端口号与源端口号保持一致;S4. The destination port number is consistent with the source port number;
S5、基于源端口号、源IP地址、目的端口号、目的IP地址以及感知数据信息封装成标准IP网络报文。S5. Encapsulate the source port number, source IP address, destination port number, destination IP address and sensing data information into a standard IP network message.
网络流量特征提取的具体方法如下:The specific method of network traffic feature extraction is as follows:
S1、网络流量特征提取模块从网络汇聚模块获得镜像网络流量;S1, the network traffic feature extraction module obtains the mirror network traffic from the network aggregation module;
S2、网络流量特征提取模块根据镜像流量分析该网络流量的源端口号、源IP地址、网络流量特征;S2, the network traffic feature extraction module analyzes the source port number, source IP address, and network traffic features of the network traffic according to the mirror traffic;
S3、通过源端口号、源IP地址完成终端身份鉴别;S3, complete the terminal identity authentication through the source port number and source IP address;
S4、通过对网络流量特征的持续性学习,按终端来源评估网络流量特征匹配度;S4. Through continuous learning of network traffic characteristics, the matching degree of network traffic characteristics is evaluated according to the terminal source;
S5、根据终端身份鉴别结果以及网络流量特征匹配度,向访问控制模块下发安全策略。S5. According to the terminal identity authentication result and the matching degree of network traffic characteristics, a security policy is issued to the access control module.
网络访问控制的具体方法如下:The specific methods of network access control are as follows:
S1、访问控制模块从网络流量特征提取模块实时获取最新的安全策略;S1, the access control module obtains the latest security policy from the network traffic feature extraction module in real time;
S2、访问控制模块实时匹配当前网络流量和安全策略;S2, the access control module matches the current network traffic and security policies in real time;
S2-1、对于不符合安全策略的网络流量,实施阻断处理并进行安全告警;S2-1. For network traffic that does not comply with security policies, block it and issue security alerts.
S2-2、对于符合安全策略的网络流量,交给网络流量处理模块进行后续处理。S2-2. The network traffic that complies with the security policy is handed over to the network traffic processing module for subsequent processing.
本实施例提出了一种面向异构物联网接入手段的网络层归一化处理方法和安全防护装置,能够在网络层完成对异构物联网终端的汇聚接入,能够以较低代价实现终端身份鉴别和网络流量特征分析等安全功能,能够有效防止假冒终端、假冒数据进入物联网网关,以满足关键行业对物联网应用的高安全需求。This embodiment proposes a network layer normalization processing method and a security protection device for heterogeneous Internet of Things access means, which can complete the converged access of heterogeneous Internet of Things terminals at the network layer, can realize security functions such as terminal identity authentication and network traffic feature analysis at a relatively low cost, and can effectively prevent counterfeit terminals and counterfeit data from entering the Internet of Things gateway, so as to meet the high security requirements of key industries for Internet of Things applications.
实施例2Example 2
参照图3,如图3所示是前述实施例中的异构物联网接入安全防护装置在典型物联网应用的流程框图。具体包括以下步骤:Referring to FIG. 3 , FIG. 3 is a flowchart of the heterogeneous Internet of Things access security protection device in the aforementioned embodiment in a typical Internet of Things application. Specifically, the following steps are included:
S1、各种异构物联网终端接入物联网网关;S1. Various heterogeneous IoT terminals are connected to the IoT gateway;
S2、物联网网关接口处理模块与物联网终端通信,引接物联网通信协议;S2, the Internet of Things gateway interface processing module communicates with the Internet of Things terminal and connects to the Internet of Things communication protocol;
S3、物联网网关接口处理模块将物联网终端的协议报文发送给安全防护装置;S3, the Internet of Things gateway interface processing module sends the protocol message of the Internet of Things terminal to the security protection device;
S4、物联网网关安全防护装置从协议报文中提取出协议类型、表征终端ID的身份信息以及感知数据等必要信息;S4, the IoT gateway security protection device extracts necessary information such as the protocol type, identity information representing the terminal ID, and perception data from the protocol message;
S5、物联网网关安全防护装置将异构的非IP报文转换成标准的IP网络报文;S5, the IoT gateway security protection device converts heterogeneous non-IP messages into standard IP network messages;
S6、物联网网关安全防护装置从标准的IP网络报文中提取出源地址身份、网络流量特征等信息,并形成安全策略;S6, the IoT gateway security protection device extracts information such as source address identity, network traffic characteristics, etc. from standard IP network messages and forms a security strategy;
S7、物联网网关安全防护装置根据安全防护策略对归一化网络流量实施访问控制,并阻断不合规的网络流量;S7. The IoT gateway security protection device implements access control on normalized network traffic according to the security protection strategy and blocks non-compliant network traffic;
S8、物联网网关安全防护装置将合规的网络流量通网络数据发送模块,发送给相关的物联网应用。S8. The IoT gateway security protection device sends the compliant network traffic to the relevant IoT applications through the network data sending module.
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the protection scope of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410660247.XACN118250097B (en) | 2024-05-27 | 2024-05-27 | A heterogeneous Internet of Things access security protection device and method |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410660247.XACN118250097B (en) | 2024-05-27 | 2024-05-27 | A heterogeneous Internet of Things access security protection device and method |
| Publication Number | Publication Date |
|---|---|
| CN118250097Atrue CN118250097A (en) | 2024-06-25 |
| CN118250097B CN118250097B (en) | 2024-07-26 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410660247.XAActiveCN118250097B (en) | 2024-05-27 | 2024-05-27 | A heterogeneous Internet of Things access security protection device and method |
| Country | Link |
|---|---|
| CN (1) | CN118250097B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108092948A (en)* | 2016-11-23 | 2018-05-29 | 中国移动通信集团湖北有限公司 | A kind of recognition methods of network attack mode and device |
| CN110958262A (en)* | 2019-12-15 | 2020-04-03 | 国网山东省电力公司电力科学研究院 | Ubiquitous Internet of Things security protection gateway system, method and deployment architecture for power industry |
| CN113157588A (en)* | 2021-05-11 | 2021-07-23 | 北京创原天地科技有限公司 | Safety test framework suitable for Internet of things |
| CN113467311A (en)* | 2021-07-08 | 2021-10-01 | 国网新疆电力有限公司电力科学研究院 | Electric power Internet of things safety protection device and method based on software definition |
| US20220272129A1 (en)* | 2021-02-25 | 2022-08-25 | Cisco Technology, Inc. | Traffic capture mechanisms for industrial network security |
| CN115051836A (en)* | 2022-05-18 | 2022-09-13 | 中国人民解放军战略支援部队信息工程大学 | APT attack dynamic defense method and system based on SDN |
| CN115426135A (en)* | 2022-08-12 | 2022-12-02 | 中国电信股份有限公司 | Method, device and equipment for processing flow detection rules and detecting network flow |
| WO2023278084A1 (en)* | 2021-06-30 | 2023-01-05 | Forescout Technologies, Inc. | Generating network system maps based on network traffic |
| CN116582365A (en)* | 2023-07-12 | 2023-08-11 | 北京亿赛通科技发展有限责任公司 | Network traffic safety control method and device and computer equipment |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108092948A (en)* | 2016-11-23 | 2018-05-29 | 中国移动通信集团湖北有限公司 | A kind of recognition methods of network attack mode and device |
| CN110958262A (en)* | 2019-12-15 | 2020-04-03 | 国网山东省电力公司电力科学研究院 | Ubiquitous Internet of Things security protection gateway system, method and deployment architecture for power industry |
| US20220272129A1 (en)* | 2021-02-25 | 2022-08-25 | Cisco Technology, Inc. | Traffic capture mechanisms for industrial network security |
| CN113157588A (en)* | 2021-05-11 | 2021-07-23 | 北京创原天地科技有限公司 | Safety test framework suitable for Internet of things |
| WO2023278084A1 (en)* | 2021-06-30 | 2023-01-05 | Forescout Technologies, Inc. | Generating network system maps based on network traffic |
| CN113467311A (en)* | 2021-07-08 | 2021-10-01 | 国网新疆电力有限公司电力科学研究院 | Electric power Internet of things safety protection device and method based on software definition |
| CN115051836A (en)* | 2022-05-18 | 2022-09-13 | 中国人民解放军战略支援部队信息工程大学 | APT attack dynamic defense method and system based on SDN |
| CN115426135A (en)* | 2022-08-12 | 2022-12-02 | 中国电信股份有限公司 | Method, device and equipment for processing flow detection rules and detecting network flow |
| CN116582365A (en)* | 2023-07-12 | 2023-08-11 | 北京亿赛通科技发展有限责任公司 | Network traffic safety control method and device and computer equipment |
| Title |
|---|
| Z. MINJIE等: ""Fingerprint Identification Technology of Power IOT Terminal based on Network Traffic Feature"", 《2023 IEEE 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, BIG DATA AND ARTIFICIAL INTELLIGENCE (ICIBA)》, 6 July 2023 (2023-07-06)* |
| 侯明星;亓慧;: "基于SDN的异构型物联网安全解决方案研究", 物联网技术, no. 12, 20 December 2017 (2017-12-20)* |
| Publication number | Publication date |
|---|---|
| CN118250097B (en) | 2024-07-26 |
| Publication | Publication Date | Title |
|---|---|---|
| US20040240447A1 (en) | Method and system for identifying bidirectional packet flow | |
| CN108769292B (en) | Message data processing method and device | |
| CN103763194B (en) | A kind of message forwarding method and device | |
| CN105207778B (en) | A method of realizing packet identity and digital signature on accessing gateway equipment | |
| CN107819730A (en) | Data transmission method, safety insulating device and vehicle-mounted Ethernet system | |
| CN101505283B (en) | A message processing method and device | |
| CN113691547A (en) | A HTTPS header enhancement method for 5G UPF network elements | |
| US9077662B2 (en) | Service linkage control system and method | |
| CN101499903B (en) | Method, apparatus, system, customer node, peer node and convergent point for preventing node forged identity | |
| CN118250097B (en) | A heterogeneous Internet of Things access security protection device and method | |
| CN108418794B (en) | Method and system for preventing ARP attack by intelligent substation communication network | |
| CN109167774B (en) | A data message and a data flow security mutual access method on a firewall | |
| CN115665737A (en) | Internet of things terminal authentication method based on zero trust architecture | |
| CN118174968B (en) | An explicit and implicit feature recognition device and method for an Internet of Things terminal device | |
| CN111464550B (en) | HTTPS transparent protection method for message processing equipment | |
| CN114629667A (en) | A Link Dynamic Change Method Based on IP Wide Range Transformation | |
| CN102045313B (en) | Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network) | |
| CN100579075C (en) | A Method of Quickly Responding to ICMP Echo Request Message | |
| CN114157509B (en) | Encryption method and device based on national secret algorithm with SSL and IPsec | |
| CN114666129B (en) | Network security authentication method, system, computer device and storage medium | |
| CN102546552A (en) | Authentication method, equipment and system | |
| CN115967527A (en) | Internet of things information data transmission method based on white box key | |
| CN115767538A (en) | An information verification method, information processing method, device and equipment | |
| CN110572415B (en) | Safety protection method, equipment and system | |
| CN120321655B (en) | Method and system for constructing trusted master network by expanding SIM card in multi-identification network system |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |