TWI727891B - A method and apparatus for network security - Google Patents
A method and apparatus for network security Download PDFInfo
- Publication number
- TWI727891B TWI727891B TW109132530A TW109132530A TWI727891B TW I727891 B TWI727891 B TW I727891B TW 109132530 A TW109132530 A TW 109132530A TW 109132530 A TW109132530 A TW 109132530A TW I727891 B TWI727891 B TW I727891B
- Authority
- TW
- Taiwan
- Prior art keywords
- protection box
- parameter
- iot
- wan
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000007689 inspection Methods 0.000 claims description 9
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- YFPJFKYCVYXDJK-UHFFFAOYSA-N Diphenylphosphine oxide Chemical compound C=1C=CC=CC=1[P+](=O)C1=CC=CC=C1 YFPJFKYCVYXDJK-UHFFFAOYSA-N 0.000 claims 9
- 230000001681 protective effect Effects 0.000 description 18
- 238000012545 processing Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本發明係有關於一種網路安全防護方法及裝置,尤指應用於物聯網設備與終端平台間的方法及裝置。 The present invention relates to a network security protection method and device, especially a method and device applied between Internet of Things equipment and a terminal platform.
由於網路資訊非常多元,為了有效應用、分享數位資訊,很多的硬體設備都會與廣域網路連接,以獲得立即有用的數位資訊,但也因此網路安全便成為維護網路正常運作最重要的一環。 Because network information is very diverse, in order to effectively apply and share digital information, many hardware devices are connected to the wide area network to obtain immediately useful digital information. However, network security has become the most important thing for maintaining the normal operation of the network. One ring.
目前對於網路安全維護的方法,如我國新型專利第M508729號「應用於物聯裝置之網路安全防護模組」所示,係以一監控單元接收各種輸入至物聯裝置之訊號,且將訊號傳送至雲端處理單元,雲端處理單元再以處理器判讀訊號之網路攻擊類型,並存取資料庫中對應之防護軟體且傳送至監控單元,以對物聯裝置進行所受網路攻擊類型之防駭防毒的網路安全防護動作。 The current method of network security maintenance, as shown in my country's new patent No. M508729 "Network security protection module applied to IoT devices", is to use a monitoring unit to receive various signals input to the IoT device, and to The signal is sent to the cloud processing unit, and the cloud processing unit uses the processor to determine the type of network attack of the signal, accesses the corresponding protection software in the database and sends it to the monitoring unit to perform the type of network attack on the IoT device The anti-hacking and anti-virus network security protection action.
惟上述該專利案所揭示防護模組中,該監控單元是將所接收的訊號藉由廣域網路(WAN)上傳至雲端處理單元進行判斷,若判斷為有害訊號時,再經由廣域網路(WAN)對該物聯裝置進行防護;然通常雲端處理單元(即業者的終端平台)必須以廣域網路(WAN)同時連接成千上萬的物聯裝置,當其中一個物聯裝置夾帶有害訊號上傳雲端處理單元時,該有害訊號便可以同時不經雲端處理單元透過廣域網路(WAN)對其他物聯裝置進行攻擊或安裝後門的發散動作,因此縱然雲端處理單元關閉原始夾帶有害訊號的物聯裝置連接,埋藏在其他物 聯裝置的有害訊號還是無法完全徹底消除,而對整個網路安全構成嚴重威脅,而顯有改進的必要。 However, in the protection module disclosed in the above-mentioned patent, the monitoring unit uploads the received signal to the cloud processing unit through the wide area network (WAN) for judgment, and if it is judged to be a harmful signal, it passes through the wide area network (WAN). Protect the IoT device; however, usually the cloud processing unit (ie the terminal platform of the industry) must be connected to thousands of IoT devices via a wide area network (WAN) at the same time. When one of the IoT devices carries harmful signals and uploads it to the cloud for processing The harmful signal can be used to attack other IoT devices through the wide area network (WAN) without passing through the cloud processing unit or install a backdoor to diverge. Therefore, even if the cloud processing unit closes the original connection of the IoT device that carries the harmful signal, Buried in other things The harmful signals of connected devices still cannot be completely eliminated, and they pose a serious threat to the security of the entire network, and there is a clear need for improvement.
本案發明人有鑑於此,加予研究創新,終於揭示一種網路安全防護方法及裝置。 In view of this, the inventor of the present case added research and innovation, and finally revealed a network security protection method and device.
本發明之目的旨在提供一種網路安全防護方法,係包括:將至少一物聯設備連接至一物聯網防護盒;於該物聯網防護盒與廣域網路間連接至少一廣域網路防護盒,並令該廣域網路防護盒透過該廣域網路連接至一終端平台;其中該物聯網防護盒內建至少一種演算法,而該廣域網路防護盒係內建至少兩種演算法,令該物聯網防護盒蒐集所接收之資訊後進行演算,產生一參數(a2),並將該資訊傳遞至該廣域網路防護盒,且令該廣域網路防護盒將該物聯網防護盒所輸入之資訊與其本身所蒐集的資訊透過其內建演算法演算後產生一參數(b1),以對該物聯網防護盒提供必要的資訊並進行更新,並且該物聯網防護盒將該物聯網防護盒所得之參數(a2)與該廣域網路防護盒之參數(b1)進行分析,擇一作為決策依據,以有效阻擋惡意訊號的攻擊或發散。 The object of the present invention is to provide a network security protection method, which includes: connecting at least one IoT device to an IoT protection box; connecting at least one wide area network protection box between the IoT protection box and the wide area network, and The wide area network protection box is connected to a terminal platform through the wide area network; wherein the IoT protection box is built in at least one algorithm, and the wide area network protection box is built in at least two algorithms, so that the IoT protection box After collecting the received information, perform calculations to generate a parameter (a2), and pass the information to the WAN protection box, and make the WAN protection box the information input by the IoT protection box and the information collected by itself The information is calculated by its built-in algorithm to generate a parameter (b1) to provide the necessary information and update the IoT protection box, and the IoT protection box obtains the parameters (a2) from the IoT protection box and The parameters (b1) of the WAN protection box are analyzed, and one of them is selected as the basis for decision-making to effectively block the attack or divergence of malicious signals.
本發明所揭示之網路安全防護方法,進一步於該廣域網路防護盒與終端平台間連接至少一終端防護盒,令該終端防護盒內建至少一演算法,且可蒐集其周圍連接之資訊及該廣域網路防護盒所蒐集之資訊,並令該終端防護盒經演算法演算後產生參數(a、b),其中該參數(b)係用以更新該該廣域網路防護盒之資訊,而該廣域網路防護盒經判別、篩選該終端防護盒之參數(a)後產生一參數(a1),以供該物聯網防護盒進行資料更新。 The network security protection method disclosed in the present invention further connects at least one terminal protection box between the wide area network protection box and the terminal platform, so that the terminal protection box has at least one algorithm built in, and can collect information and connections around it. The information collected by the WAN protection box, and the terminal protection box is calculated by an algorithm to generate parameters (a, b), wherein the parameter (b) is used to update the information of the WAN protection box, and the After the WAN protection box is judged and filtered the parameter (a) of the terminal protection box, a parameter (a1) is generated for the data update of the IoT protection box.
本發明所揭示之網路安全防護方法,其中該物聯網防護盒所得之各該參數(a2、b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a2、b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該 參數(a2、b1)落於高風險區間時關閉所對應之該物聯設備,令所得之該參數(a2、b1)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, each parameter (a2, b1) obtained by the IoT protection box is divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that the obtained parameter (a2 、B1) When it falls within the weak confidence interval, it is reported to the administrator to do a follow-up inspection and analysis, so that the obtained When the parameters (a2, b1) fall in the high-risk range, turn off the corresponding IOT device, so that when the obtained parameters (a2, b1) fall in the low-risk range, only the information is collected.
本發明所揭示之網路安全防護方法,其中該廣域網路防護盒所得之參數(b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(b1)落於高風險區間時關閉所對應之該物聯網防護盒,令所得之該參數(b1)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, the parameter (b1) obtained by the wide area network protection box is divided into a low-risk interval, a weak confidence interval and a high-risk interval, so that the obtained parameter (b1) falls in the weak In the confidence interval, the administrator will be reported to perform follow-up inspection and analysis, and when the obtained parameter (b1) falls within the high-risk interval, the corresponding IoT protection box will be closed, and the obtained parameter (b1) will fall within the low-risk interval. Only collect this information at that time.
本發明所揭示之網路安全防護方法,其中該終端防護盒所得之參數(a、b),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a、b)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a、b)落於高風險區間時關閉所對應之該廣域網路防護盒,令所得之該參數(a、b)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, the parameters (a, b) obtained by the terminal protection box are divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that the obtained parameters (a, b) When it falls in the weak confidence zone, the administrator will be reported to perform follow-up inspection and analysis. When the obtained parameter (a, b) falls in the high risk zone, the corresponding WAN protection box will be closed, and the obtained parameter (a, b) will be closed. b) Only collect the information when it falls in the low-risk zone.
本發明所揭示之網路安全防護方法,係對該物聯網防護盒所產生的參數(a2)與該廣域網路防護盒所產生的參數(b1)進行比較,令兩參數(a2)、(b1)落於不同區間時,係以該廣域網路防護盒所產生的參數(b1)作為決策依據,令兩參數(a2)、(b1)落於相同區間時,則以該物聯網防護盒所產生的參數(a2)作為決策依據。 The network security protection method disclosed in the present invention compares the parameter (a2) generated by the IoT protection box with the parameter (b1) generated by the WAN protection box, so that the two parameters (a2) and (b1) When) falls in different intervals, the parameter (b1) generated by the WAN protection box is used as the basis for decision-making. When the two parameters (a2) and (b1) fall in the same interval, the IoT protection box generates The parameter (a2) of is used as the basis for decision-making.
本發明所揭示之網路安全防護方法,其中令該物聯網防護盒所取得該廣域網路防護盒所產生之該參數(b1)時間大於一預定值時,係以該物聯網防護盒所產生的參數(a2)作為決策依據。 In the network security protection method disclosed in the present invention, when the time of the parameter (b1) generated by the wide area network protection box obtained by the IoT protection box is greater than a predetermined value, it is generated by the IoT protection box Parameter (a2) is used as the basis for decision-making.
本發明所揭示之網路安全防護方法,其中令該廣域網路防護盒所產生之該參數(b1)時間大於該預定值時,將該廣域網路防護盒所產生之該參數(b1)係進入排程更新該物聯網防護盒之內部資訊。 In the network security protection method disclosed in the present invention, when the time of the parameter (b1) generated by the WAN protection box is greater than the predetermined value, the parameter (b1) generated by the WAN protection box is entered into the row The process updates the internal information of the IoT protection box.
本發明所揭示之網路安全防護方法,其中該廣域網路防護盒是內建DPPO(Distributed Proximal Policy Optimization)與A3C(Asynchronous Advantage Actor-Critic)兩種演算法;該物聯網防護盒是內建DDPG(Deep Deterministic Policy Gradient)演算法。 In the network security protection method disclosed in the present invention, the wide area network protection box is built-in DPPO (Distributed Proximal Policy Optimization) and A3C (Asynchronous Advantage Actor-Critic) two algorithms; the Internet of Things protection box is built-in DDPG (Deep Deterministic Policy Gradient) algorithm.
上述該廣域網路防護盒當A3C演算法無法收斂時,該DPPO演算法介入輔其收斂。 When the aforementioned wide area network protection box fails to converge in the A3C algorithm, the DPPO algorithm intervenes to assist its convergence.
本發明所揭示之網路安全防護方法,其中該終端防護盒,是內建DPPO演算法。 In the network security protection method disclosed in the present invention, the terminal protection box has a built-in DPPO algorithm.
本發明之另一目的旨在揭示一種網路安全防護之裝置,係包含一物聯網防護盒,至少含有一輸入/輸出端,用以連接物聯設備,並內建至少一種演算法,令該物聯網防護盒所蒐集之資訊經各該演算法演算分析後產生至少一參數並向外輸出,用以控制該物聯設備;以及一廣域網路防護盒,至少含有一輸入/輸出埠,用以連接於該物聯網防護盒與一終端平台間,並內建至少兩種演算法,令該廣域網路防護盒所蒐集之資訊經各該演算法演算分析後產生至少一參數,並將該參數向外輸出至該物聯網防護盒。 Another object of the present invention is to disclose a network security protection device, which includes an IoT protection box, at least one input/output terminal for connecting IoT devices, and at least one built-in algorithm to make the The information collected by the IoT protection box is calculated and analyzed by each algorithm to generate at least one parameter and output it to control the IoT device; and a wide area network protection box containing at least one input/output port for It is connected between the IoT protection box and a terminal platform, and has built-in at least two algorithms, so that the information collected by the WAN protection box is calculated and analyzed by each algorithm to generate at least one parameter, and the parameter is transferred to Output to the IoT protective box.
本發明所揭示之網路安全防護之裝置,進一步包含一終端防護盒,至少含有一輸入/輸出端,用以連接該廣域網路防護盒與該終端平台間,並內建至少一種演算法,令該終端防護盒所蒐集之資訊經該演算法演算後產生至少一參數並向外輸出至該廣域網路防護盒。 The network security protection device disclosed in the present invention further includes a terminal protection box, which contains at least one input/output terminal for connecting the wide area network protection box and the terminal platform, and has at least one built-in algorithm to make The information collected by the terminal protection box is calculated by the algorithm to generate at least one parameter and output to the wide area network protection box.
本發明所揭示之方法及裝置,可由以下說明及所附之圖式,而得以明晰。 The method and device disclosed in the present invention can be clarified by the following description and accompanying drawings.
(10):物聯網防護盒 (10): IoT protection box
(11):輸入/輸出端 (11): Input/output terminal
(20):廣域網路防護盒 (20): WAN protection box
(21):輸入/輸出埠 (21): Input/output port
(30):終端平台 (30): Terminal platform
(40):終端防護盒 (40): Terminal protection box
(41):輸入/輸出端 (41): Input/output terminal
(a)(a1)(a2)(b)(b1):參數 (a)(a1)(a2)(b)(b1): parameters
(IoT):物聯設備 (IoT): IoT devices
圖1:係本發明第一實施例之流程圖。 Figure 1: is a flow chart of the first embodiment of the present invention.
圖2:係本發明第二實施例之流程圖。 Figure 2: is a flow chart of the second embodiment of the present invention.
圖3:係本發明各該防護盒之操作流程圖。 Figure 3: The operation flow chart of each protective box of the present invention.
圖4:係本發明物聯網防護盒控管流程圖。 Figure 4: It is a flow chart of the control and management of the IoT protection box of the present invention.
圖5:係本發明物聯網防護盒之決策流程圖。 Figure 5: is the decision flow chart of the IoT protection box of the present invention.
圖6:係本發明物廣域網路防護盒之決策流程圖。 Fig. 6: The decision flow chart of the wide area network protection box of the present invention.
圖7:係本發明終端防護盒之決策流程圖。 Figure 7: The decision-making flow chart of the terminal protection box of the present invention.
請參閱圖1及圖3所示,本發明係有關於一種網路安全防護方法,係包括:將至少一物聯設備(IoT)連接至一物聯網防護盒(10);於該物聯網防護盒(10)與廣域網路(WAN)間連接至少一廣域網路防護盒(20),並令該廣域網路防護盒(20)透過該廣域網路連接至一終端平台(30);其中該物聯網防護盒(10)係內建至少一演算法(AI algorithms),而該廣域網路防護盒(20)內建有至少兩種演算法(AI algorithms),令該物聯網防護盒(10)蒐集所接收之資訊後進行演算,產生一參數(a2),並將該資訊傳遞至該廣域網路防護盒(20),且該廣域網路防護盒(20)將該物聯網防護盒(10)所輸入之資訊與其本身所蒐集的資訊透過其內建演算法演算後產生一參數(b1),以對該物聯網防護盒(10)提供資訊並進行更新,並且該物聯網防護盒(10)可將該物聯網防護盒(10)所得之參數(a2)與該廣域網路防護盒(20)之參數(b1)進行分析,擇一作為決策依據,用以有效阻擋惡意訊號的攻擊或發散。 Please refer to Figures 1 and 3, the present invention relates to a network security protection method, which includes: connecting at least one Internet of Things (IoT) device to an Internet of Things protection box (10); At least one wide area network protection box (20) is connected between the box (10) and the wide area network (WAN), and the wide area network protection box (20) is connected to a terminal platform (30) through the wide area network; wherein the Internet of Things protection The box (10) has at least one built-in algorithm (AI algorithms), and the wide area network protection box (20) has at least two built-in algorithms (AI algorithms), so that the IoT protection box (10) collects the received After calculating the information, generate a parameter (a2), and transmit the information to the WAN protection box (20), and the WAN protection box (20) will input the information from the IoT protection box (10) The information collected by itself is calculated by its built-in algorithm to generate a parameter (b1) to provide information and update the IoT protection box (10), and the IoT protection box (10) can The parameters (a2) obtained by the networked protection box (10) and the parameters (b1) of the wide area network protection box (20) are analyzed, and one of them is selected as a decision basis to effectively block the attack or divergence of malicious signals.
如圖2、圖3所示,本發明所揭示之網路安全防護方法,進一步於該廣域網路防護盒(20)與終端平台(30)間連接至少一終端防護盒(40),令該終端防護盒(40)內建至少一演算法(AI algorithms),且可蒐集其周圍連接之資訊及該廣域網路防護盒(20)所蒐集之資訊,並令該終端防護盒(40)經演算法演算後產生參數(a、b),該參數(b)係用以更新該廣域網路防護盒(20)之資訊,而該廣域網路防 護盒(20)經判別、篩選該終端防護盒(40)之參數(a)後產生一參數(a1),以供該物聯網防護盒(10)進行資料更新。 As shown in Figures 2 and 3, the network security protection method disclosed in the present invention further connects at least one terminal protection box (40) between the wide area network protection box (20) and the terminal platform (30) to make the terminal The protective box (40) is built-in at least one algorithm (AI algorithms), and can collect the information of its surrounding connections and the information collected by the WAN protective box (20), and make the terminal protective box (40) perform the algorithm After the calculation, the parameters (a, b) are generated. The parameter (b) is used to update the information of the WAN protection box (20), and the WAN protection The protective box (20) generates a parameter (a1) after discriminating and screening the parameter (a) of the terminal protective box (40) for data update of the IoT protective box (10).
如圖3所示,上述該物聯網防護盒(10)蒐集所接收之資訊是指源自周圍的無線訊號,例如3G/4G/5G訊號、WiFi或藍牙等無線訊號,當然也可以是所連接的有線訊號,本發明並不予自限。 As shown in Figure 3, the information collected by the IoT protective box (10) refers to wireless signals from the surroundings, such as 3G/4G/5G signals, WiFi or Bluetooth, etc., of course, it can also be connected The present invention is not self-limiting.
本發明所揭示之物聯網防護盒(10)所連接之物聯設備(IoT)是指可連接區域網路(LAN)的電子設備,如平板電腦、筆電或行動電話等行動裝置;或如冰箱、電視、冷氣等家電產品;或監視器、門鎖等保全裝置或如汽車、自動販賣機、...等等,本發明並不予自限該物聯設備(IoT)的種類。 The Internet of Things (IoT) connected to the IoT protective box (10) disclosed in the present invention refers to an electronic device that can be connected to a local area network (LAN), such as a mobile device such as a tablet, a laptop or a mobile phone; or Home appliances such as refrigerators, TVs, and air conditioners; or security devices such as monitors, door locks, or automobiles, vending machines, etc., the present invention does not limit the types of IoT devices.
本發明所揭示之廣域網路防護盒(20),係可蒐集周圍所連接的資訊,該資訊是可指所連接之廣域網路狀態或源自廣域網路所提供的訊息,如傳輸速度、連接之IP、上傳次數、連網時間、連接設備的資訊(例如品牌、上網連結搜尋紀錄)...等等,本發明並不予自限。上述該終端防護盒(40)所蒐集之周圍連接資訊,是可指由外部設備廠商所提供的監控資訊參數(SOC)、公開的監控訊息參數、網路設備資訊...等等,本發明並不自限該終端防護盒(40)所蒐集之資訊種類或形式。 The wide area network protection box (20) disclosed in the present invention can collect information about the surrounding connection, which can refer to the state of the connected wide area network or the information provided by the wide area network, such as transmission speed, connected IP , The number of uploads, the time of connection to the Internet, the information of the connected device (such as the brand, the search record of Internet links)... etc., the present invention is not self-limiting. The surrounding connection information collected by the terminal protection box (40) may refer to monitoring information parameters (SOC), public monitoring information parameters, network equipment information... etc. provided by external equipment manufacturers. It does not limit the type or form of information collected by the terminal protection box (40).
如圖3所示,本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)係提取該終端防護盒(40)所產生可供該物聯網防護盒(10)利用的參數(a)並予以判別、篩選後產生一可供物聯網防護盒(10)利用的參數(a1),並將該參數(a1)傳送至該物聯網防護盒(10)。 As shown in Figure 3, in the network security protection method disclosed in the present invention, the wide area network protection box (20) extracts the parameters generated by the terminal protection box (40) that can be used by the IoT protection box (10) (a) After discrimination and screening, a parameter (a1) that can be used by the IoT protective box (10) is generated, and the parameter (a1) is transmitted to the IoT protective box (10).
如圖4所示,本發明所揭示之網路安全防護方法,係對該物聯網防護盒(10)所產生的參數(a2)與該廣域網路防護盒(20)所產生的參數(b1)進行比較,令兩參數(a2)、(b1)落於不同區間時,係以該廣域網路防護盒(20)所產生的 參數(b1)作為決策依據,令兩參數(a2)、(b1)落於相同區間時,則以該物聯網防護盒(10)所產生的參數(a2)作為決策依據。 As shown in Figure 4, the network security protection method disclosed in the present invention is a parameter (a2) generated by the IoT protection box (10) and a parameter (b1) generated by the WAN protection box (20) For comparison, when the two parameters (a2) and (b1) fall in different intervals, they are generated by the WAN protection box (20) The parameter (b1) is used as the basis for decision-making, and when the two parameters (a2) and (b1) fall in the same interval, the parameter (a2) generated by the IoT protective box (10) is used as the basis for decision-making.
如圖4所示,本發明所揭示之網路安全防護方法,其中令該物聯網防護盒(10)所取得該廣域網路防護盒(20)所產生之該參數(b1)時間大於一預定值時,係以該物聯網防護盒(10)所產生的參數(a2)作為決策依據。上述之預定值可依使用者之需求設定,例如1毫秒,本發明並不予自限。 As shown in FIG. 4, the network security protection method disclosed in the present invention, wherein the time of the parameter (b1) generated by the WAN protection box (20) obtained by the IoT protection box (10) is greater than a predetermined value At this time, the parameter (a2) generated by the IoT protective box (10) is used as the basis for decision-making. The above-mentioned predetermined value can be set according to the user's needs, such as 1 millisecond, and the present invention is not self-limiting.
如圖4所示,本發明所揭示之網路安全防護方法,其中令該廣域網路防護盒(20)所產生之該參數(b1)時間大於該預定值時,令該廣域網路防護盒(20)將所產生之該參數(b1)進入排程,依排程時間對該物聯網防護盒(10)之內部資訊進行資訊更新。 As shown in FIG. 4, the network security protection method disclosed in the present invention, wherein when the time of the parameter (b1) generated by the WAN protection box (20) is greater than the predetermined value, the WAN protection box (20) ) Enter the generated parameter (b1) into the schedule, and update the internal information of the IoT protective box (10) according to the schedule time.
如圖5所示,本發明所揭示之網路安全防護方法,其中該物聯網防護盒(10)所得之各該參數(a2、b1),係可依業者之需求,將其區分為低風險區間、弱信心區間及高風險區間等三個區間,當然本發明並不自限劃分區間的數目。本發明令所得之該參數(a2、b1)落於弱信心區間時,係回報管理員做後續檢查分析;令所得之該參數(a2、b1)落於高風險區間時,關閉所對應有問題的物聯設備(IoT),令所得之該參數(a2、b1)落於低風險區間時僅作該筆資訊蒐集。由於當物聯網防護盒(10)判定所連接之訊號為高風險區間時,便可關閉對應節點的物聯設備(IoT),使有害訊號不會循物聯網防護盒(10)進入該廣域網路(WAN),可以將有害訊號封阻在區域網路(LAN)內,以提昇網路安全的防護效果。 As shown in Figure 5, in the network security protection method disclosed in the present invention, the parameters (a2, b1) obtained by the IoT protection box (10) can be classified as low-risk according to the needs of the industry There are three intervals: the interval, the weak confidence interval, and the high-risk interval. Of course, the present invention does not limit the number of intervals. In the present invention, when the obtained parameter (a2, b1) falls within the weak confidence interval, it is reported to the administrator to perform follow-up inspection and analysis; when the obtained parameter (a2, b1) falls within the high risk interval, the corresponding problem is closed When the parameters (a2, b1) are in the low-risk range, only the information is collected for the Internet of Things (IoT). When the IoT protection box (10) determines that the connected signal is in a high-risk zone, the Internet of Things (IoT) of the corresponding node can be turned off, so that harmful signals will not enter the wide area network through the IoT protection box (10) (WAN), can block harmful signals in the local area network (LAN) to improve the protection effect of network security.
如圖6所示,本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)所得之參數(b1),係可依業者之需求,區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(b1)落於高風險區間時關閉所對應節點有問題的物聯網防護盒(10),令所得之該參數(b1)落於低風險區間時僅作該筆資訊蒐集。緣 此,當廣域網路防護盒(20)判定所連接之訊號為高風險區間時,便可關閉所對應的物聯網防護盒(10),使有害訊號不會循物聯網防護盒(10)再進入該廣域網路(WAN)的其他節點,使本發明可以將有害訊號進行封鎖,避免對終端平台(30)造成安全危害,以提昇網路安全的防護效果。 As shown in Figure 6, in the network security protection method disclosed in the present invention, the parameter (b1) obtained by the wide area network protection box (20) can be divided into a low-risk zone, a weak-confidence zone, and a zone according to the needs of the industry. High-risk interval. When the obtained parameter (b1) falls within the weak confidence interval, the administrator will do a follow-up inspection and analysis. When the obtained parameter (b1) falls within the high-risk interval, the corresponding node will be closed. The networked protection box (10) makes the obtained parameter (b1) fall within the low-risk range only for the information collection. edge Therefore, when the WAN protection box (20) determines that the connected signal is in a high-risk zone, the corresponding IoT protection box (10) can be closed so that harmful signals will not enter the IoT protection box (10) again The other nodes of the wide area network (WAN) enable the present invention to block harmful signals, avoid causing security hazards to the terminal platform (30), and improve the protection effect of network security.
如圖7所示,本發明所揭示之網路安全防護方法,其中該終端防護盒(40)所得之參數(a、b),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a、b)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a、b)落於高風險區間時關閉所對應節點有問題的廣域網路防護盒(20),令所得之該參數(a、b)落於低風險區間時僅作該筆資訊蒐集。如此,使本發明所揭示之終端防護盒(40)形成最後一道網路安全防線,以有效保護終端平台(30)的安全。 As shown in Figure 7, in the network security protection method disclosed in the present invention, the parameters (a, b) obtained by the terminal protection box (40) are divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that When the obtained parameters (a, b) fall within the weak confidence interval, the administrator will be reported to perform follow-up inspection and analysis, so that when the obtained parameters (a, b) fall within the high risk interval, the WAN with the corresponding node will be closed. The protective box (20) makes the obtained parameters (a, b) fall within the low-risk range only for the information collection. In this way, the terminal protection box (40) disclosed in the present invention forms the last network security line of defense to effectively protect the security of the terminal platform (30).
本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)是可內建DPPO與A3C兩種演算法;而該物聯網防護盒(10)是內建DDPG演算法。該終端防護盒(40),是內建DPPO演算法。 In the network security protection method disclosed in the present invention, the wide area network protection box (20) can be built-in DPPO and A3C two algorithms; and the Internet of things protection box (10) is a built-in DDPG algorithm. The terminal protection box (40) has a built-in DPPO algorithm.
本發明所揭示之網路安全防護方法,該廣域網路防護盒(20)當A3C演算法無法收斂時,令該DPPO演算法介入輔其收斂,使本發明之處理速度可以更加迅速。 In the network security protection method disclosed in the present invention, when the wide area network protection box (20) fails to converge in the A3C algorithm, the DPPO algorithm is intervened to assist its convergence, so that the processing speed of the present invention can be faster.
如圖1、2所示,本發明之另一目的旨在揭示一種網路安全防護之裝置,係包含一物聯網防護盒(10),至少含有一輸入/輸出端(11),用以連接物聯設備(IoT),並內建至少一種演算法,令該物聯網防護盒(10)所蒐集之資訊經該演算法演算分析後產生一參數,並向外輸出,用以控制該物聯設備(IoT);以及一廣域網路防護盒(20),至少含有一輸入/輸入埠(21),用以連接於該物聯網防護盒(10)與一終端平台(30)間,並內建至少兩種演算法,令該廣域網路防護盒所蒐集 之資訊經各該演算法演算分析後產生至少一參數,並向外輸出至該物聯網防護盒(10)。 As shown in Figures 1 and 2, another object of the present invention is to disclose a network security protection device, which includes an IoT protection box (10), at least one input/output terminal (11) for connection The Internet of Things (IoT) device has at least one built-in algorithm, so that the information collected by the Internet of Things protection box (10) is calculated and analyzed by the algorithm to generate a parameter and output it to control the Internet of Things Equipment (IoT); and a wide area network protection box (20), which contains at least one input/input port (21) for connecting between the IoT protection box (10) and a terminal platform (30), and is built-in At least two algorithms to make the WAN protection box collected The information is calculated and analyzed by each algorithm to generate at least one parameter, and output to the IoT protective box (10).
如圖1、2所示,本發明所揭示網路安全防護之裝置,進一步包含一終端防護盒(40),至少含有一輸入/輸出端(42),用以連接於該廣域網路防護盒(20)與該終端平台(30)間,並內建至少一種演算法,令該終端防護盒(40)所蒐集之資訊經該演算法演算後產生至少一參數,並向外輸出至該廣域網路防護盒(20)。 As shown in Figures 1 and 2, the network security protection device disclosed in the present invention further includes a terminal protection box (40), which contains at least one input/output terminal (42) for connecting to the wide area network protection box ( 20) At least one algorithm is built in between the terminal platform (30), and the information collected by the terminal protection box (40) is calculated by the algorithm to generate at least one parameter, and output to the wide area network. Protective box (20).
本發明所揭示網路安全防護之方法,係在物聯設備(IoT)與廣域網路(WAN)間藉由物聯網防護盒(10)將有安全疑慮的物聯設備(IoT)所發出的訊號進行阻擋或關閉該物聯設備(IoT),使有安全疑慮的訊號可以封閉在區域網路(LAN),而不進入廣域網路(WAN);另外在進入廣域網路(WAN)及進入終端平台(30)前,藉由廣域網路防護盒(20)及終端防護盒(40)兩道安全防護牆,分別對可疑訊號、攻擊進行阻擋,以提高網路安全防護的可靠性。 The method of network security protection disclosed in the present invention is a signal sent by an IoT device (IoT) with security concerns through the IoT protection box (10) between the Internet of Things (IoT) and the Wide Area Network (WAN) Block or turn off the Internet of Things (IoT), so that signals with security concerns can be closed on the local area network (LAN) instead of entering the wide area network (WAN); in addition, when entering the wide area network (WAN) and entering the terminal platform ( Before 30), the two security walls of the wide area network protection box (20) and the terminal protection box (40) were used to block suspicious signals and attacks to improve the reliability of network security protection.
本發明所揭示網路安全防護之方法,其中該物聯設備(IoT)、廣域網路防護盒(20)與終端防護盒(40)間,可以將彼此所蒐集的資訊列為演算的基礎,使演算結果可以更為精準、快速。 The method for network security protection disclosed in the present invention, wherein the Internet of Things (IoT), wide area network protection box (20) and terminal protection box (40) can use the information collected by each other as the basis of calculation, so that The calculation results can be more accurate and faster.
本發明所揭示之方法及裝置,可於不違本發明之精神、範疇下予以修飾應用,並不自限於上述實施方式。 The methods and devices disclosed in the present invention can be modified and applied without violating the spirit and scope of the present invention, and are not limited to the above-mentioned embodiments.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW109132530A TWI727891B (en) | 2020-09-21 | 2020-09-21 | A method and apparatus for network security |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW109132530A TWI727891B (en) | 2020-09-21 | 2020-09-21 | A method and apparatus for network security |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI727891B true TWI727891B (en) | 2021-05-11 |
| TW202213385A TW202213385A (en) | 2022-04-01 |
Family
ID=77036398
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW109132530A TWI727891B (en) | 2020-09-21 | 2020-09-21 | A method and apparatus for network security |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI727891B (en) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180191675A1 (en) * | 2016-12-30 | 2018-07-05 | Fortinet, Inc. | Security Fabric for Internet of Things (IOT) |
| TW201830921A (en) * | 2017-02-10 | 2018-08-16 | 美商高通公司 | Systems and methods for network monitoring |
| CN110612703A (en) * | 2017-03-15 | 2019-12-24 | Abb瑞士股份有限公司 | Gateway Configuration in Industrial IoT |
| CN110830287A (en) * | 2019-09-27 | 2020-02-21 | 西北大学 | Internet of things environment situation sensing method based on machine learning |
| CN111294365A (en) * | 2020-05-12 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Attack flow protection system, method and device, electronic equipment and storage medium |
| CN111510433A (en) * | 2020-03-18 | 2020-08-07 | 山东大学 | A method for detecting malicious traffic in Internet of Things based on fog computing platform |
-
2020
- 2020-09-21 TW TW109132530A patent/TWI727891B/en active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180191675A1 (en) * | 2016-12-30 | 2018-07-05 | Fortinet, Inc. | Security Fabric for Internet of Things (IOT) |
| TW201830921A (en) * | 2017-02-10 | 2018-08-16 | 美商高通公司 | Systems and methods for network monitoring |
| CN110612703A (en) * | 2017-03-15 | 2019-12-24 | Abb瑞士股份有限公司 | Gateway Configuration in Industrial IoT |
| CN110830287A (en) * | 2019-09-27 | 2020-02-21 | 西北大学 | Internet of things environment situation sensing method based on machine learning |
| CN111510433A (en) * | 2020-03-18 | 2020-08-07 | 山东大学 | A method for detecting malicious traffic in Internet of Things based on fog computing platform |
| CN111294365A (en) * | 2020-05-12 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Attack flow protection system, method and device, electronic equipment and storage medium |
| CN111294365B (en) | 2020-05-12 | 2020-08-18 | 腾讯科技(深圳)有限公司 | Attack flow protection system, method and device, electronic equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202213385A (en) | 2022-04-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pan et al. | Context aware intrusion detection for building automation systems | |
| Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
| US11522887B2 (en) | Artificial intelligence controller orchestrating network components for a cyber threat defense | |
| Rubio et al. | Current cyber-defense trends in industrial control systems | |
| CN114584405A (en) | Electric power terminal safety protection method and system | |
| JP5248612B2 (en) | Intrusion detection method and system | |
| CN111245793A (en) | Anomaly analysis method and device for network data | |
| Rubio et al. | Analysis of Intrusion Detection Systems in Industrial Ecosystems. | |
| EP4111665A1 (en) | Cyber security for a software-as-a-service factoring risk | |
| CN110602041A (en) | White list-based Internet of things equipment identification method and device and network architecture | |
| CN116760636A (en) | An active defense system and method for unknown threats | |
| CN111181971B (en) | System for automatically detecting industrial network attack | |
| US20150358292A1 (en) | Network security management | |
| Wang et al. | Source-based defense against DDoS attacks in SDN based on sFlow and SOM | |
| CN114244728A (en) | Network security situation evaluation and prediction method based on multi-factor layering | |
| CN118018231A (en) | Security policy management method, device, equipment and storage medium for isolation zone | |
| CN120321033B (en) | AI-based dynamic security risk assessment and intelligent response system and method | |
| CN111224973A (en) | Network attack rapid detection system based on industrial cloud | |
| CN119182599A (en) | Equipment access authentication method, device, equipment and storage medium | |
| CN117692251A (en) | A processor network security defense system and method | |
| CN116962052A (en) | Network security monitoring methods, devices, equipment, media and computer program products | |
| CN118862063A (en) | A security detection system, method, device and medium for a large model of government affairs industry | |
| Turcato et al. | A cloud-based method for detecting intrusions in profinet communication networks based on anomaly detection | |
| Arifin et al. | The trends of supervisory control and data acquisition security challenges in heterogeneous networks | |
| CN113569236B (en) | A method and system for monitoring and protecting security of an Internet of Things terminal |