Movatterモバイル変換


[0]ホーム

URL:


CN118337539B - Internet of things-based network security communication control method and system - Google Patents

Internet of things-based network security communication control method and system
Download PDF

Info

Publication number
CN118337539B
CN118337539BCN202410772977.9ACN202410772977ACN118337539BCN 118337539 BCN118337539 BCN 118337539BCN 202410772977 ACN202410772977 ACN 202410772977ACN 118337539 BCN118337539 BCN 118337539B
Authority
CN
China
Prior art keywords
time
data
network
representing
space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410772977.9A
Other languages
Chinese (zh)
Other versions
CN118337539A (en
Inventor
刘翠华
蔡勇
汪洋
刘靖
卫明生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Guanwen Digital Technology Co ltd
Original Assignee
Jiaxing Guanwen Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Guanwen Digital Technology Co ltdfiledCriticalJiaxing Guanwen Digital Technology Co ltd
Priority to CN202410772977.9ApriorityCriticalpatent/CN118337539B/en
Publication of CN118337539ApublicationCriticalpatent/CN118337539A/en
Application grantedgrantedCritical
Publication of CN118337539BpublicationCriticalpatent/CN118337539B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention discloses a network security communication control method and system based on the Internet of things, which relate to the technical field of network security and comprise the steps of acquiring network data and preprocessing the network data; extracting a time stamp and geographic position information of equipment interaction in network data; the method constructs a space-time sequence data set, and utilizes a time sequence analysis and spatial clustering technology to effectively integrate space-time characteristics, so that the analysis dimension and the anomaly detection precision of the data are improved; the constructed space-time baseline model combines history learning and dynamic updating, accurately predicts baseline values, and realizes real-time monitoring of network behaviors; real-time data processing and model input strategies ensure the instantaneity of model prediction and quickly identify network state changes; by combining an anomaly score algorithm, the system can automatically detect deviation behaviors, immediately trigger early warning and take isolation measures, conduct deep investigation and repair, dynamically adjust a safety strategy and remarkably enhance network safety monitoring efficiency and anomaly response capability in the environment of the Internet of things.

Description

Internet of things-based network security communication control method and system
Technical Field
The invention relates to the technical field of network security, in particular to a network security communication control method and system based on the Internet of things.
Background
In recent years, the rapid development of the internet of things technology has spawned a great number of emerging scenes of data interaction and equipment interconnection, but the network security problem is increasingly serious, the traditional protective measures are worry about the breadth and the dynamics of the internet of things, especially the defects in the aspects of space-time characteristic analysis and dynamic behavior learning are difficult to effectively cope with complex and changeable security threats.
Aiming at the current situation, the method creatively merges a time sequence analysis and spatial clustering technology, builds a space-time baseline model, realizes the fine processing and real-time monitoring of network data, can accurately identify abnormal behaviors and rapidly adjust communication strategies by deep mining and model prediction of interaction data, and remarkably enhances the network safety protection capability and response efficiency in the environment of the Internet of things.
Disclosure of Invention
The present invention has been made in view of the above-described problems occurring in the prior art.
Therefore, the invention provides a network security communication control method and system based on the Internet of things, which solve the problems that the traditional protective measures are worry about the breadth and the dynamics of the Internet of things, especially the defects in the aspects of space-time characteristic analysis and dynamic behavior learning are overcome, and the complex and variable security threats are difficult to effectively cope with.
In order to solve the technical problems, the invention provides the following technical scheme:
In a first aspect, an embodiment of the present invention provides a network security communication control method based on the internet of things, which includes acquiring network data, adding a timestamp to the network data, and then preprocessing the network data;
based on the preprocessed network data, extracting the time stamp and geographical position information of equipment interaction, constructing a time-space sequence data set, and carrying out time sequence analysis and spatial clustering;
Based on the results of time sequence analysis and spatial clustering, constructing a space-time baseline model, training, and calculating a predicted baseline value to obtain a standard baseline value;
After the network data collected in real time are subjected to the same pretreatment, inputting a trained space-time baseline model to obtain a real-time baseline value;
calculating the real-time baseline value and the standard baseline value by adopting an abnormal score, and judging whether the behavior deviates or not;
when the behaviors deviate, early warning is immediately triggered, abnormal behavior data are collected, and a network safety communication control method is adjusted.
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: the network data includes: network traffic data, inter-device communication records, device status update information, geographic location information, and log records;
The pretreatment method comprises the following steps: data cleaning and data normalization.
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: the preprocessing is performed after adding the time stamp to the network data, and the method specifically comprises the following steps:
the addition timestamp expression is:
In the method, in the process of the invention,Representing network data with a time stamp, T representing a time stamp value of a current time, and D representing the network data;
Using data cleansing, time-stamped network dataRemoving repeated and invalid data, and normalizing the data to obtain preprocessed network data
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: based on the preprocessed network data, extracting the time stamp and the geographic position information of equipment interaction, constructing a time-space sequence data set, and carrying out time sequence analysis and spatial clustering, wherein the time sequence analysis and the spatial clustering are specifically as follows:
The preprocessed network data is represented asWhere n represents the total number of data,Representing a record in the preprocessed network data,=1, 2,.. Each record contains a time stampAnd geographic location coordinatesAndAnd respectively extracting the longitude and latitude coordinates of the record to obtain the following data, wherein the expression is as follows: Wherein n represents the total number of data;
screening and integrating based on the extracted data, wherein the expression is as follows:
In the method, in the process of the invention,Representing a filtered and potentially spatio-temporal sequence candidate set including hours of time stamp aggregationAnd corresponding average geographic location coordinatesIs an identifier of one hour, conditionRepresenting screening dataIs provided with a record of all the records in the database,Determining a time stampThe time is converted into hours and then matched to the hoursIndicating a specific flow threshold condition set,Representing geographic coordinates must be well-defined;
Constructing a space-time sequence data set S, wherein the expression is as follows:
Wherein each ofRepresenting a time stamp in the spatio-temporal sequence data set SRepresenting geographical location coordinates under these timestamps, i=1, 2,..m, m representing the total number of data after screening, m being smaller than n;
And applying time sequence analysis and spatial clustering to the space-time sequence data set S, wherein the formula is as follows:
In the method, in the process of the invention,Representing the predicted target variable value at time point t,The intercept term of the model is represented,Representing p time points in the pastThe value of the sum of the values,Represents the autoregressive coefficients, where p is the order of the autoregressive term,Represents a running average coefficient, where q is the order of the running average term,Representing the random error term of the model at time t,Representing past q error values;
In the method, in the process of the invention,Representing the j-th cluster of clusters,Representing one data point in the data set,Representing data pointsAnd cluster withA core point of (a)The distance between the two plates is set to be equal,Representing the radius of the neighborhood,Representing data pointsIs a number of points in the neighborhood of (a),Representing a minimum neighborhood point threshold.
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: based on the results of time sequence analysis and spatial clustering, a space-time baseline model is constructed and trained, and a predicted baseline value is calculated, specifically as follows:
Constructing a space-time baseline model, wherein the expression of a predicted baseline value is as follows:
In the method, in the process of the invention,Representing the predicted baseline value at time t,Is a normalization factor that is used to normalize the data,Representing the dynamic update factor(s),The number of clusters is represented and,The attenuation rate is indicated as a function of the attenuation rate,The function of the distance is represented as such,Representing the center of the j-th cluster,The feature vector representing the prediction is presented as a result of the prediction,Representing the predicted target variable value at time point t,The weight of the j-th cluster is represented,Representing the j-th cluster of clusters,Representing the predicted value of the space-time baseline model of the last time step t-1,Representing the center of the kth cluster, exp representing an exponential function;
And training a model by using the historical data, and learning the characteristics and modes of normal behaviors to obtain a standard base line B.
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: after the network data collected in real time are subjected to the same pretreatment, the network data are input into a trained space-time baseline model to obtain real-time baseline values, and the method comprises the following steps of:
Instant accurate time stamping of each piece of data collected at tForming a real-time data streamNext, the process willThe preprocessing step and the extraction step are carried out to obtain a real-time space-time sequence data set
Based on real-time spatio-temporal sequence data setsExtractingAnd calculates a predictive feature vectorInputting the model to obtain real-time baseline value
As a preferable scheme of the network security communication control method based on the Internet of things, the invention comprises the following steps: calculating the real-time baseline value and the standard baseline value by adopting an abnormal score, judging whether the behavior deviates, immediately triggering early warning when the behavior deviates, then collecting abnormal behavior data, and adjusting a network safety communication control method, wherein the method comprises the following specific steps:
will be the real-time baseline valueCombining with standard baseline value B into feature vectorThe anomaly score expression is:
In the method, in the process of the invention,Representing feature vectors for a point in time tE represents the expected value,Representation pair functionAt all ofThe average value over the value is the value,Indicating the desired path length, z indicating the number of samples,Representing the depth of the tree, wherein an anomaly scoreThe value range of (2) is [0,1];
When abnormality scoresWhen the value is=0, the network is safe and does not operate;
When abnormality scoresWhen the system is in the abnormal behavior when the system is in the range of the abnormal behavior, the network abnormality is indicated, the early warning is immediately triggered, then abnormal behavior data are collected, the network isolation is carried out on equipment and service with the abnormal behavior, the abnormal behavior is prevented from being spread, the deep inspection is carried out on the isolated equipment or system, once the loopholes or the weaknesses are confirmed, the repairing measures are immediately taken, the safety risk is eliminated, and the network safety strategy is revised and perfected according to the nature of the abnormal behavior, so that the network safety communication control method is adjusted.
In a second aspect, the invention provides a network security communication control system based on the internet of things, which comprises a data preprocessing module, a data processing module and a data processing module, wherein the data preprocessing module is responsible for receiving and preprocessing original network data;
The space-time data construction module is used for extracting a time stamp and geographic position information based on the preprocessed data, constructing a space-time sequence data set S and carrying out time sequence analysis and spatial clustering;
The space-time base line model construction module is used for constructing a space-time base line model based on the results of time sequence analysis and spatial clustering and adoptsCalculating a predicted baseline value;
The real-time baseline calculation module is used for continuously receiving real-time network data, performing the same data processing flow as the preprocessing module, and inputting a trained space-time baseline model to obtain a real-time baseline value;
The abnormality detection module is used for calculating the real-time baseline value and the standard baseline value by adopting an abnormality score and judging whether the behavior deviates or not;
And the strategy adjustment module is used for immediately executing a series of response measures after the abnormal early warning is received, wherein the response measures comprise network isolation of abnormal equipment, deep security check to identify loopholes and weaknesses and repair security risks, and revising and perfecting network security strategies according to the nature of abnormal behaviors.
In a third aspect, embodiments of the present invention provide a computer apparatus comprising a memory and a processor, the memory storing a computer program, wherein: the computer program when executed by a processor implements any step of the network security communication control method based on the internet of things according to the first aspect of the present invention.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium having a computer program stored thereon, wherein: the computer program when executed by a processor implements any step of the network security communication control method based on the internet of things according to the first aspect of the present invention.
The invention has the beneficial effects that: by extracting and analyzing the time stamp and the geographic position information of the network data, the invention constructs a time-space sequence data set, and effectively integrates time-space characteristics by using a time sequence analysis and spatial clustering technology, thereby improving the analysis dimension and the anomaly detection precision of the data; the constructed space-time baseline model combines history learning and dynamic updating, accurately predicts baseline values, and realizes real-time monitoring of network behaviors; real-time data processing and model input strategies ensure the instantaneity of model prediction and quickly identify network state changes; by combining an anomaly score algorithm, the system can automatically detect deviation behaviors, immediately trigger early warning and take isolation measures, conduct deep investigation and repair, dynamically adjust a safety strategy and remarkably enhance network safety monitoring efficiency and anomaly response capability in the environment of the Internet of things.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a network security communication control method based on the internet of things in embodiment 1.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways other than those described herein, and persons skilled in the art will readily appreciate that the present invention is not limited to the specific embodiments disclosed below.
Further, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic can be included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Example 1
Referring to fig. 1, in a first embodiment of the present invention, the embodiment provides a network security communication control method based on the internet of things, including the following steps:
S1, acquiring network data, adding a time stamp to the network data, and preprocessing;
based on the preprocessed network data, extracting the time stamp and geographical position information of equipment interaction, constructing a time-space sequence data set, and carrying out time sequence analysis and spatial clustering;
Based on the results of time sequence analysis and spatial clustering, constructing a space-time baseline model, training, and calculating a predicted baseline value to obtain a standard baseline value;
After the network data collected in real time are subjected to the same pretreatment, inputting a trained space-time baseline model to obtain a real-time baseline value;
calculating the real-time baseline value and the standard baseline value by adopting an abnormal score, and judging whether the behavior deviates or not;
when the behaviors deviate, early warning is immediately triggered, abnormal behavior data are collected, and a network safety communication control method is adjusted.
The network data includes: network traffic data, inter-device communication records, device status update information, geographic location information, and log records;
the pretreatment method comprises the following steps: data cleaning and data normalization.
The preprocessing is performed after adding a timestamp to the network data, and the method specifically comprises the following steps:
the addition timestamp expression is:
In the method, in the process of the invention,Representing network data with a time stamp, T representing a time stamp value of a current time, and D representing the network data;
Using data cleansing, time-stamped network dataRemoving repeated and invalid data, and normalizing the data to obtain preprocessed network data
S2, based on the preprocessed network data, extracting equipment interaction time stamps and geographic position information, constructing a time-space sequence data set, and carrying out time sequence analysis and spatial clustering, wherein the method comprises the following steps of:
The preprocessed network data is represented asWhere n represents the total number of data,Representing a record in the preprocessed network data,=1, 2,.. Each record contains a time stampAnd geographic location coordinatesAndAnd respectively extracting the longitude and latitude coordinates of the record to obtain the following data, wherein the expression is as follows: Wherein n represents the total number of data;
screening and integrating based on the extracted data, wherein the expression is as follows:
In the method, in the process of the invention,Representing a filtered and potentially spatio-temporal sequence candidate set including hours of time stamp aggregationAnd corresponding average geographic location coordinatesIs an identifier of one hour, conditionRepresenting screening dataIs provided with a record of all the records in the database,Determining a time stampThe time is converted into hours and then matched to the hoursIndicating a specific flow threshold condition set,Representing geographic coordinates must be well-defined;
Constructing a space-time sequence data set S, wherein the expression is as follows:
Wherein each ofRepresenting a time stamp in the spatio-temporal sequence data set SRepresenting geographical location coordinates under these timestamps, i=1, 2,..m, m representing the total number of data after screening, m being smaller than n;
And applying time sequence analysis and spatial clustering to the space-time sequence data set S, wherein the formula is as follows:
In the method, in the process of the invention,Representing the predicted target variable value at time point t,The intercept term of the model is represented,Representing p time points in the pastThe value of the sum of the values,Represents the autoregressive coefficients, where p is the order of the autoregressive term,Represents a running average coefficient, where q is the order of the running average term,Representing the random error term of the model at time t,Representing past q error values;
In the method, in the process of the invention,Representing the j-th cluster of clusters,Representing one data point in the data set,Representing data pointsAnd cluster withA core point of (a)The distance between the two plates is set to be equal,Representing the radius of the neighborhood,Representing data pointsIs a number of points in the neighborhood of (a),Representing a minimum neighborhood point threshold;
It should be noted that, by screening and integrating the space-time information and constructing a space-time sequence data set, the space distribution and time dynamics of the network activity can be comprehensively depicted, an intuitive and rich information basis is provided for subsequent analysis, the time sequence analysis can reveal the change rule and trend of the data along with time, the spatial clustering analysis can find the mode on the geographic position, and the two are combined, so that the space-time characteristics of the network behavior can be captured more accurately, and a strong support is provided for anomaly detection.
S3, based on the results of time sequence analysis and spatial clustering, constructing a space-time baseline model, training, and calculating a predicted baseline value, wherein the method specifically comprises the following steps:
Constructing a space-time baseline model, wherein the expression of a predicted baseline value is as follows:
In the method, in the process of the invention,Representing the predicted baseline value at time t,Is a normalization factor that is used to normalize the data,Representing the dynamic update factor(s),The number of clusters is represented and,The attenuation rate is indicated as a function of the attenuation rate,The function of the distance is represented as such,Representing the center of the j-th cluster,The feature vector representing the prediction is presented as a result of the prediction,Representing the predicted target variable value at time point t,The weight of the j-th cluster is represented,Representing the j-th cluster of clusters,Representing the predicted value of the space-time baseline model of the last time step t-1,Representing the center of the kth cluster, exp representing an exponential function;
Training a model by utilizing historical data, and learning the characteristics and modes of normal behaviors to obtain a standard base line B;
It should be noted that, by constructing the space-time baseline model, the model of normal network behavior can be learned based on the historical data, the baseline value under normal condition can be predicted, a reference standard is provided for real-time monitoring, in the model training process, the model can be better fitted with the historical data through optimizing parameters, so that the prediction accuracy is improved, the dynamic update factor and the normalization factor are introduced, the model can be flexibly adapted to new data, and the real-time property and accuracy of prediction are maintained.
S4, after the network data collected in real time are subjected to the same pretreatment, inputting a trained space-time baseline model to obtain a real-time baseline value, wherein the real-time baseline value is specifically as follows:
Instant accurate time stamping of each piece of data collected at tForming a real-time data streamNext, the process willThe preprocessing step and the extraction step are carried out to obtain a real-time space-time sequence data set
Based on real-time spatio-temporal sequence data setsExtractingAnd calculates a predictive feature vectorInputting the model to obtain real-time baseline value
It should be noted that, processing network data in real time and inputting a model can obtain the baseline predicted value of the current behavior in real time, which enables the system to monitor the network state in real time, respond to any abnormal change quickly, real-time is the key of network security monitoring, discover and process threats in time, reduce loss, and improve the security and reliability of the system.
S5, calculating the real-time baseline value and the standard baseline value by adopting an abnormal score, judging whether the behavior deviates, immediately triggering early warning when the behavior deviates, then collecting abnormal behavior data, and adjusting a network safety communication control method, wherein the method comprises the following specific steps:
will be the real-time baseline valueCombining with standard baseline value B into feature vectorThe anomaly score expression is:
In the method, in the process of the invention,Representing feature vectors for a point in time tE represents the expected value,Representation pair functionAt all ofThe average value over the value is the value,Indicating the desired path length, z indicating the number of samples,Representing the depth of the tree, wherein an anomaly scoreThe value range of (2) is [0,1];
When abnormality scoresWhen the value is=0, the network is safe and does not operate;
When abnormality scoresWhen=1, the network is abnormal, which is indicated by abnormal behavior;
When the network behavior is detected to deviate from a normal baseline remarkably, the system immediately triggers an early warning mechanism, an emergency response flow is started immediately, firstly, data related to the abnormal behavior is automatically collected, the full view of an abnormal event is ensured to be recorded thoroughly, a foundation is laid for subsequent analysis, and then network isolation is implemented on equipment or service for confirming the abnormal behavior, and the rapid isolation strategy aims at suppressing abnormal propagation, preventing potential threat from spreading to other parts of the network and protecting the safety of the whole system;
Subsequently, a deep security check is performed on the isolated devices and services, which is a careful inspection process aimed at identifying the root cause of the abnormal behavior, whether software vulnerabilities, configuration errors or external attacks, and once the check confirms a specific vulnerability or system vulnerability, the response team will immediately perform repair measures, including patching, closing unsafe ports, adjusting the configuration to quickly eliminate the identified security risk, and restoring the security of the affected part;
On the basis, the characteristics of abnormal behaviors are deeply analyzed, the original network security policy is revised by utilizing the holes, the strengthening weak links are adjusted by the targeted policy, the flexibility and the defense strength of network communication control are improved, including, the system can better adapt to the newly-appearing security challenges through the ordered series of response and policy adjustment, and ensure the long-term network security and communication stability;
It should be noted that, by calculating the anomaly score to determine the deviation of the behavior, the potential threat can be identified efficiently, and the early warning mechanism is triggered, which is a key step of active defense, collecting anomaly data and adjusting the control strategy, so that the current problem can be solved pertinently, the long-term network security strategy can be optimized, the similar problem is avoided from happening again, and the measures of isolation, inspection, repair and strategy adjustment form a closed loop, thereby ensuring effective management and continuous improvement of network security events and improving the overall defense capability.
The embodiment also provides a network security communication control system based on the Internet of things, which comprises a data preprocessing module, a data processing module and a data processing module, wherein the data preprocessing module is responsible for receiving and preprocessing original network data;
The space-time data construction module is used for extracting a time stamp and geographic position information based on the preprocessed data, constructing a space-time sequence data set S and carrying out time sequence analysis and spatial clustering;
The space-time base line model construction module is used for constructing a space-time base line model based on the results of time sequence analysis and spatial clustering and adoptsCalculating a predicted baseline value;
The real-time baseline calculation module is used for continuously receiving real-time network data, performing the same data processing flow as the preprocessing module, and inputting a trained space-time baseline model to obtain a real-time baseline value;
The abnormality detection module is used for calculating the real-time baseline value and the standard baseline value by adopting an abnormality score and judging whether the behavior deviates or not;
And the strategy adjustment module is used for immediately executing a series of response measures after the abnormal early warning is received, wherein the response measures comprise network isolation of abnormal equipment, deep security check to identify loopholes and weaknesses and repair security risks, and revising and perfecting network security strategies according to the nature of abnormal behaviors.
The embodiment also provides a computer device, which is applicable to the situation of the network security communication control method based on the internet of things, and comprises the following steps: a memory and a processor; the memory is used for storing computer executable instructions, and the processor is used for executing the computer executable instructions to realize the network security communication control method based on the internet of things according to the embodiment.
The computer device may be a terminal comprising a processor, a memory, a communication interface, a display screen and input means connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
The present embodiment also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements the network security communication control method based on the internet of things set forth in the above embodiment; the storage medium may be implemented by any type or combination of volatile or nonvolatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM), electrically erasable Programmable Read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), erasable Programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), programmable Read-Only Memory (PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
In summary, the beneficial effects of the specific steps of the invention are analyzed as follows:
Preprocessing after adding a timestamp to the network data: by adding accurate time stamps to the network data, the time sequence and timeliness of the data can be ensured, the subsequent time sequence analysis is convenient, useless information and abnormal values are removed when the data are cleaned and standardized, the analysis result is more accurate and reliable, the data in different dimensions can be compared on the same scale through the standardized processing, and the deviation caused by inconsistent dimensions is avoided.
Constructing a space-time sequence data set, and carrying out time sequence analysis and spatial clustering: by screening and integrating the space-time information and constructing a space-time sequence data set, the space distribution and time dynamics of network activities can be comprehensively depicted, an intuitive and rich information basis is provided for subsequent analysis, the time sequence analysis can reveal the change rule and trend of data along with time, the spatial clustering analysis can find the mode on the geographic position, and the two are combined, so that the space-time characteristics of network behaviors can be captured more accurately, and a strong support is provided for anomaly detection.
Building a space-time baseline model and training: by constructing the space-time baseline model, the baseline value under the normal condition can be predicted based on the mode of the normal network behavior of the historical data, a reference standard is provided for real-time monitoring, and in the model training process, the model can be better fitted with the historical data through optimizing parameters, so that the prediction accuracy is improved, the dynamic update factors and the normalization factors are introduced, the model can be flexibly adapted to new data, and the real-time property and accuracy of prediction are maintained.
Calculating a real-time baseline value: the network data is processed in real time and is input into a model, and the baseline predicted value of the current behavior can be obtained in real time, so that the system can monitor the network state in real time, respond to any abnormal change quickly, the real-time performance is the key of network security monitoring, the threat can be found and processed in time, the loss is reduced, and the security and the reliability of the system are improved.
And (3) judging whether the behavior deviates or not by adopting anomaly score calculation, so as to adjust the network security communication control method: the potential threat can be identified efficiently by calculating the abnormal score judgment behavior deviation, and the early warning mechanism is triggered, which is a key step of active defense, abnormal data is collected and a control strategy is adjusted, so that the current problem can be solved pertinently, a long-term network security strategy can be optimized, the similar problem is avoided from happening again, the measures of isolation, inspection, repair and strategy adjustment form a closed loop, the effective management and continuous improvement of network security events are ensured, and the integral defense capability is improved.
It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.

Claims (7)

In the method, in the process of the invention,Representing the predicted baseline value at time t,Is a normalization factor that is used to normalize the data,Representing the dynamic update factor(s),The number of clusters is represented and,The attenuation rate is indicated as a function of the attenuation rate,The function of the distance is represented as such,Representing the center of the j-th cluster,The feature vector representing the prediction is presented as a result of the prediction,Representing the predicted target variable value at time point t,The weight of the j-th cluster is represented,Representing the j-th cluster of clusters,Representing the predicted value of the space-time baseline model of the last time step t-1,Representing the center of the kth cluster, exp representing an exponential function;
CN202410772977.9A2024-06-172024-06-17Internet of things-based network security communication control method and systemActiveCN118337539B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202410772977.9ACN118337539B (en)2024-06-172024-06-17Internet of things-based network security communication control method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202410772977.9ACN118337539B (en)2024-06-172024-06-17Internet of things-based network security communication control method and system

Publications (2)

Publication NumberPublication Date
CN118337539A CN118337539A (en)2024-07-12
CN118337539Btrue CN118337539B (en)2024-08-16

Family

ID=91766340

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202410772977.9AActiveCN118337539B (en)2024-06-172024-06-17Internet of things-based network security communication control method and system

Country Status (1)

CountryLink
CN (1)CN118337539B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN118568455B (en)*2024-07-312024-10-29兰州大学Network security big data state evaluation method based on pattern recognition
CN118869537A (en)*2024-08-192024-10-29无锡鑫坤通信工程有限公司 A multi-agent implementation method for network communication
CN118940969A (en)*2024-09-232024-11-12深圳市天兴诚科技有限公司 Production data analysis system and method for digital factory Internet of Things
CN119030799B (en)*2024-10-282025-06-13南京中新赛克科技有限责任公司 Method for mining and analyzing abnormal behaviors of industrial Internet security
CN120166386B (en)*2025-04-142025-09-12北京涛丰网络科技有限公司Emergency communication linkage system and method based on network security early warning
CN120224176B (en)*2025-05-082025-09-30中科联芯(广州)科技有限公司 A remote detection system for deep buried cables based on cloud services

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10504026B2 (en)*2015-12-012019-12-10Microsoft Technology Licensing, LlcStatistical detection of site speed performance anomalies
US11509671B2 (en)*2017-06-092022-11-22British Telecommunications Public Limited CompanyAnomaly detection in computer networks
CN109743187B (en)*2018-11-232021-11-16奇安信科技集团股份有限公司Industrial control network anomaly detection method and device
CN111858712A (en)*2020-07-202020-10-30上海仪电(集团)有限公司中央研究院In-situ water quality inspection data time-space analysis and anomaly detection method and system
CN111898758B (en)*2020-09-292021-03-02苏宁金融科技(南京)有限公司User abnormal behavior identification method and device and computer readable storage medium
EP3979080A1 (en)*2020-09-302022-04-06Mastercard International IncorporatedMethods and systems for predicting time of server failure using server logs and time-series data
US12032683B2 (en)*2021-07-292024-07-09Micro Focus LlcAbnormality detection in log entry collection
CN116132311B (en)*2023-02-172023-11-21成都工业职业技术学院Network security situation awareness method based on time sequence
CN116232761B (en)*2023-05-042023-07-14华东交通大学 Method and system for network abnormal traffic detection based on shapelet
CN116796275A (en)*2023-06-272023-09-22重庆科技学院Multi-mode time sequence anomaly detection method for industrial equipment
CN116956189B (en)*2023-07-072025-06-24无锡学院Current abnormality detection system, method, electronic equipment and medium
CN117034180B (en)*2023-10-102023-12-22国网湖北省电力有限公司武汉供电公司 Power communication equipment data anomaly detection method, system and storage medium
CN117472702A (en)*2023-10-242024-01-30贵州电网有限责任公司Method and system for carrying out abnormal alarm based on network and memory state data
CN117891005A (en)*2023-12-132024-04-16贵州电网有限责任公司Ground wire icing prediction method and system based on microclimate factor time sequence
CN117421684B (en)*2023-12-142024-03-12易知谷科技集团有限公司Abnormal data monitoring and analyzing method based on data mining and neural network
CN117592060B (en)*2024-01-182024-04-12中诚华隆计算机技术有限公司Method and system for detecting security vulnerabilities of processor network

Also Published As

Publication numberPublication date
CN118337539A (en)2024-07-12

Similar Documents

PublicationPublication DateTitle
CN118337539B (en)Internet of things-based network security communication control method and system
CN113542279B (en)Network security risk assessment method, system and device
CN117955712A (en)Communication information security risk early warning management and control method and system based on big data
CN112187792A (en)Network information safety protection system based on internet
CN109583711B (en)Safety risk assessment overall process management system
CN119276602B (en) An artificial intelligence-based substation network security defense system
CN116319099A (en)Multi-terminal financial data management method and system
CN112272176A (en)Network security protection method and system based on big data platform
CN117421761B (en)Database data information security monitoring method
CN118157961B (en) Active simulation intrusion assessment and full-link visual protection system, method and equipment
CN118332548B (en)Security monitoring method, system and storage medium for computer information
CN120050067B (en) Satellite network multi-dimensional threat simulation method and system based on isolation forest detection
CN118368083A (en)Digital resource sharing and access control method
Mihailescu et al.Unveiling threats: Leveraging user behavior analysis for enhanced cybersecurity
CN117892292A (en)Abnormal process detection device and method based on sandbox
CN114448718B (en)Network security guarantee method for parallel detection and repair
CN105825130B (en) A kind of information security early warning method and device
CN119808073A (en) A method and system for evaluating enterprise data security capabilities
CN119363436A (en) Information access security system, equipment and media based on iterative trust strategy
KR102111136B1 (en)Method, device and program for generating respond directions against attack event
CN117201188B (en)IT safe operation risk prediction method, system and medium based on big data
CN118748611A (en) A network security protection method and system
CN115001940A (en)Association security situation analysis method based on artificial intelligence
Setiawan et al.Designing a Cybersecurity Risk Assessment Framework for Local Government Web-Based Applications
KR102677230B1 (en)Apparatus and method for security automation response for soar platform

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp