[go: up one dir, main page]

TWI727891B - A method and apparatus for network security - Google Patents

A method and apparatus for network security Download PDF

Info

Publication number
TWI727891B
TWI727891B TW109132530A TW109132530A TWI727891B TW I727891 B TWI727891 B TW I727891B TW 109132530 A TW109132530 A TW 109132530A TW 109132530 A TW109132530 A TW 109132530A TW I727891 B TWI727891 B TW I727891B
Authority
TW
Taiwan
Prior art keywords
protection box
parameter
iot
wan
information
Prior art date
Application number
TW109132530A
Other languages
Chinese (zh)
Other versions
TW202213385A (en
Inventor
范姜中岑
陳靜芬
常中嶺
卓瑩鎗
Original Assignee
台灣物聯網股份有限公司
台灣資料科學股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 台灣物聯網股份有限公司, 台灣資料科學股份有限公司 filed Critical 台灣物聯網股份有限公司
Priority to TW109132530A priority Critical patent/TWI727891B/en
Application granted granted Critical
Publication of TWI727891B publication Critical patent/TWI727891B/en
Publication of TW202213385A publication Critical patent/TW202213385A/en

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method and apparatus for network security is to connect at least one IoT box between IoT devices, connect a WAN box between the said IoT box and the WAN, and connect a terminal box between the said WAN box and the server, thereof the said IoT box, WAN box and terminal box have built-in AI algorithms that can collect information from each other and update parameters to prevent intrusion and do not signal an attack from inside the network.

Description

網路安全防護方法及裝置Network safety protection method and device

本發明係有關於一種網路安全防護方法及裝置,尤指應用於物聯網設備與終端平台間的方法及裝置。 The present invention relates to a network security protection method and device, especially a method and device applied between Internet of Things equipment and a terminal platform.

由於網路資訊非常多元,為了有效應用、分享數位資訊,很多的硬體設備都會與廣域網路連接,以獲得立即有用的數位資訊,但也因此網路安全便成為維護網路正常運作最重要的一環。 Because network information is very diverse, in order to effectively apply and share digital information, many hardware devices are connected to the wide area network to obtain immediately useful digital information. However, network security has become the most important thing for maintaining the normal operation of the network. One ring.

目前對於網路安全維護的方法,如我國新型專利第M508729號「應用於物聯裝置之網路安全防護模組」所示,係以一監控單元接收各種輸入至物聯裝置之訊號,且將訊號傳送至雲端處理單元,雲端處理單元再以處理器判讀訊號之網路攻擊類型,並存取資料庫中對應之防護軟體且傳送至監控單元,以對物聯裝置進行所受網路攻擊類型之防駭防毒的網路安全防護動作。 The current method of network security maintenance, as shown in my country's new patent No. M508729 "Network security protection module applied to IoT devices", is to use a monitoring unit to receive various signals input to the IoT device, and to The signal is sent to the cloud processing unit, and the cloud processing unit uses the processor to determine the type of network attack of the signal, accesses the corresponding protection software in the database and sends it to the monitoring unit to perform the type of network attack on the IoT device The anti-hacking and anti-virus network security protection action.

惟上述該專利案所揭示防護模組中,該監控單元是將所接收的訊號藉由廣域網路(WAN)上傳至雲端處理單元進行判斷,若判斷為有害訊號時,再經由廣域網路(WAN)對該物聯裝置進行防護;然通常雲端處理單元(即業者的終端平台)必須以廣域網路(WAN)同時連接成千上萬的物聯裝置,當其中一個物聯裝置夾帶有害訊號上傳雲端處理單元時,該有害訊號便可以同時不經雲端處理單元透過廣域網路(WAN)對其他物聯裝置進行攻擊或安裝後門的發散動作,因此縱然雲端處理單元關閉原始夾帶有害訊號的物聯裝置連接,埋藏在其他物 聯裝置的有害訊號還是無法完全徹底消除,而對整個網路安全構成嚴重威脅,而顯有改進的必要。 However, in the protection module disclosed in the above-mentioned patent, the monitoring unit uploads the received signal to the cloud processing unit through the wide area network (WAN) for judgment, and if it is judged to be a harmful signal, it passes through the wide area network (WAN). Protect the IoT device; however, usually the cloud processing unit (ie the terminal platform of the industry) must be connected to thousands of IoT devices via a wide area network (WAN) at the same time. When one of the IoT devices carries harmful signals and uploads it to the cloud for processing The harmful signal can be used to attack other IoT devices through the wide area network (WAN) without passing through the cloud processing unit or install a backdoor to diverge. Therefore, even if the cloud processing unit closes the original connection of the IoT device that carries the harmful signal, Buried in other things The harmful signals of connected devices still cannot be completely eliminated, and they pose a serious threat to the security of the entire network, and there is a clear need for improvement.

本案發明人有鑑於此,加予研究創新,終於揭示一種網路安全防護方法及裝置。 In view of this, the inventor of the present case added research and innovation, and finally revealed a network security protection method and device.

本發明之目的旨在提供一種網路安全防護方法,係包括:將至少一物聯設備連接至一物聯網防護盒;於該物聯網防護盒與廣域網路間連接至少一廣域網路防護盒,並令該廣域網路防護盒透過該廣域網路連接至一終端平台;其中該物聯網防護盒內建至少一種演算法,而該廣域網路防護盒係內建至少兩種演算法,令該物聯網防護盒蒐集所接收之資訊後進行演算,產生一參數(a2),並將該資訊傳遞至該廣域網路防護盒,且令該廣域網路防護盒將該物聯網防護盒所輸入之資訊與其本身所蒐集的資訊透過其內建演算法演算後產生一參數(b1),以對該物聯網防護盒提供必要的資訊並進行更新,並且該物聯網防護盒將該物聯網防護盒所得之參數(a2)與該廣域網路防護盒之參數(b1)進行分析,擇一作為決策依據,以有效阻擋惡意訊號的攻擊或發散。 The object of the present invention is to provide a network security protection method, which includes: connecting at least one IoT device to an IoT protection box; connecting at least one wide area network protection box between the IoT protection box and the wide area network, and The wide area network protection box is connected to a terminal platform through the wide area network; wherein the IoT protection box is built in at least one algorithm, and the wide area network protection box is built in at least two algorithms, so that the IoT protection box After collecting the received information, perform calculations to generate a parameter (a2), and pass the information to the WAN protection box, and make the WAN protection box the information input by the IoT protection box and the information collected by itself The information is calculated by its built-in algorithm to generate a parameter (b1) to provide the necessary information and update the IoT protection box, and the IoT protection box obtains the parameters (a2) from the IoT protection box and The parameters (b1) of the WAN protection box are analyzed, and one of them is selected as the basis for decision-making to effectively block the attack or divergence of malicious signals.

本發明所揭示之網路安全防護方法,進一步於該廣域網路防護盒與終端平台間連接至少一終端防護盒,令該終端防護盒內建至少一演算法,且可蒐集其周圍連接之資訊及該廣域網路防護盒所蒐集之資訊,並令該終端防護盒經演算法演算後產生參數(a、b),其中該參數(b)係用以更新該該廣域網路防護盒之資訊,而該廣域網路防護盒經判別、篩選該終端防護盒之參數(a)後產生一參數(a1),以供該物聯網防護盒進行資料更新。 The network security protection method disclosed in the present invention further connects at least one terminal protection box between the wide area network protection box and the terminal platform, so that the terminal protection box has at least one algorithm built in, and can collect information and connections around it. The information collected by the WAN protection box, and the terminal protection box is calculated by an algorithm to generate parameters (a, b), wherein the parameter (b) is used to update the information of the WAN protection box, and the After the WAN protection box is judged and filtered the parameter (a) of the terminal protection box, a parameter (a1) is generated for the data update of the IoT protection box.

本發明所揭示之網路安全防護方法,其中該物聯網防護盒所得之各該參數(a2、b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a2、b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該 參數(a2、b1)落於高風險區間時關閉所對應之該物聯設備,令所得之該參數(a2、b1)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, each parameter (a2, b1) obtained by the IoT protection box is divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that the obtained parameter (a2 、B1) When it falls within the weak confidence interval, it is reported to the administrator to do a follow-up inspection and analysis, so that the obtained When the parameters (a2, b1) fall in the high-risk range, turn off the corresponding IOT device, so that when the obtained parameters (a2, b1) fall in the low-risk range, only the information is collected.

本發明所揭示之網路安全防護方法,其中該廣域網路防護盒所得之參數(b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(b1)落於高風險區間時關閉所對應之該物聯網防護盒,令所得之該參數(b1)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, the parameter (b1) obtained by the wide area network protection box is divided into a low-risk interval, a weak confidence interval and a high-risk interval, so that the obtained parameter (b1) falls in the weak In the confidence interval, the administrator will be reported to perform follow-up inspection and analysis, and when the obtained parameter (b1) falls within the high-risk interval, the corresponding IoT protection box will be closed, and the obtained parameter (b1) will fall within the low-risk interval. Only collect this information at that time.

本發明所揭示之網路安全防護方法,其中該終端防護盒所得之參數(a、b),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a、b)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a、b)落於高風險區間時關閉所對應之該廣域網路防護盒,令所得之該參數(a、b)落於低風險區間時僅作該筆資訊蒐集。 In the network security protection method disclosed in the present invention, the parameters (a, b) obtained by the terminal protection box are divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that the obtained parameters (a, b) When it falls in the weak confidence zone, the administrator will be reported to perform follow-up inspection and analysis. When the obtained parameter (a, b) falls in the high risk zone, the corresponding WAN protection box will be closed, and the obtained parameter (a, b) will be closed. b) Only collect the information when it falls in the low-risk zone.

本發明所揭示之網路安全防護方法,係對該物聯網防護盒所產生的參數(a2)與該廣域網路防護盒所產生的參數(b1)進行比較,令兩參數(a2)、(b1)落於不同區間時,係以該廣域網路防護盒所產生的參數(b1)作為決策依據,令兩參數(a2)、(b1)落於相同區間時,則以該物聯網防護盒所產生的參數(a2)作為決策依據。 The network security protection method disclosed in the present invention compares the parameter (a2) generated by the IoT protection box with the parameter (b1) generated by the WAN protection box, so that the two parameters (a2) and (b1) When) falls in different intervals, the parameter (b1) generated by the WAN protection box is used as the basis for decision-making. When the two parameters (a2) and (b1) fall in the same interval, the IoT protection box generates The parameter (a2) of is used as the basis for decision-making.

本發明所揭示之網路安全防護方法,其中令該物聯網防護盒所取得該廣域網路防護盒所產生之該參數(b1)時間大於一預定值時,係以該物聯網防護盒所產生的參數(a2)作為決策依據。 In the network security protection method disclosed in the present invention, when the time of the parameter (b1) generated by the wide area network protection box obtained by the IoT protection box is greater than a predetermined value, it is generated by the IoT protection box Parameter (a2) is used as the basis for decision-making.

本發明所揭示之網路安全防護方法,其中令該廣域網路防護盒所產生之該參數(b1)時間大於該預定值時,將該廣域網路防護盒所產生之該參數(b1)係進入排程更新該物聯網防護盒之內部資訊。 In the network security protection method disclosed in the present invention, when the time of the parameter (b1) generated by the WAN protection box is greater than the predetermined value, the parameter (b1) generated by the WAN protection box is entered into the row The process updates the internal information of the IoT protection box.

本發明所揭示之網路安全防護方法,其中該廣域網路防護盒是內建DPPO(Distributed Proximal Policy Optimization)與A3C(Asynchronous Advantage Actor-Critic)兩種演算法;該物聯網防護盒是內建DDPG(Deep Deterministic Policy Gradient)演算法。 In the network security protection method disclosed in the present invention, the wide area network protection box is built-in DPPO (Distributed Proximal Policy Optimization) and A3C (Asynchronous Advantage Actor-Critic) two algorithms; the Internet of Things protection box is built-in DDPG (Deep Deterministic Policy Gradient) algorithm.

上述該廣域網路防護盒當A3C演算法無法收斂時,該DPPO演算法介入輔其收斂。 When the aforementioned wide area network protection box fails to converge in the A3C algorithm, the DPPO algorithm intervenes to assist its convergence.

本發明所揭示之網路安全防護方法,其中該終端防護盒,是內建DPPO演算法。 In the network security protection method disclosed in the present invention, the terminal protection box has a built-in DPPO algorithm.

本發明之另一目的旨在揭示一種網路安全防護之裝置,係包含一物聯網防護盒,至少含有一輸入/輸出端,用以連接物聯設備,並內建至少一種演算法,令該物聯網防護盒所蒐集之資訊經各該演算法演算分析後產生至少一參數並向外輸出,用以控制該物聯設備;以及一廣域網路防護盒,至少含有一輸入/輸出埠,用以連接於該物聯網防護盒與一終端平台間,並內建至少兩種演算法,令該廣域網路防護盒所蒐集之資訊經各該演算法演算分析後產生至少一參數,並將該參數向外輸出至該物聯網防護盒。 Another object of the present invention is to disclose a network security protection device, which includes an IoT protection box, at least one input/output terminal for connecting IoT devices, and at least one built-in algorithm to make the The information collected by the IoT protection box is calculated and analyzed by each algorithm to generate at least one parameter and output it to control the IoT device; and a wide area network protection box containing at least one input/output port for It is connected between the IoT protection box and a terminal platform, and has built-in at least two algorithms, so that the information collected by the WAN protection box is calculated and analyzed by each algorithm to generate at least one parameter, and the parameter is transferred to Output to the IoT protective box.

本發明所揭示之網路安全防護之裝置,進一步包含一終端防護盒,至少含有一輸入/輸出端,用以連接該廣域網路防護盒與該終端平台間,並內建至少一種演算法,令該終端防護盒所蒐集之資訊經該演算法演算後產生至少一參數並向外輸出至該廣域網路防護盒。 The network security protection device disclosed in the present invention further includes a terminal protection box, which contains at least one input/output terminal for connecting the wide area network protection box and the terminal platform, and has at least one built-in algorithm to make The information collected by the terminal protection box is calculated by the algorithm to generate at least one parameter and output to the wide area network protection box.

本發明所揭示之方法及裝置,可由以下說明及所附之圖式,而得以明晰。 The method and device disclosed in the present invention can be clarified by the following description and accompanying drawings.

(10):物聯網防護盒 (10): IoT protection box

(11):輸入/輸出端 (11): Input/output terminal

(20):廣域網路防護盒 (20): WAN protection box

(21):輸入/輸出埠 (21): Input/output port

(30):終端平台 (30): Terminal platform

(40):終端防護盒 (40): Terminal protection box

(41):輸入/輸出端 (41): Input/output terminal

(a)(a1)(a2)(b)(b1):參數 (a)(a1)(a2)(b)(b1): parameters

(IoT):物聯設備 (IoT): IoT devices

圖1:係本發明第一實施例之流程圖。 Figure 1: is a flow chart of the first embodiment of the present invention.

圖2:係本發明第二實施例之流程圖。 Figure 2: is a flow chart of the second embodiment of the present invention.

圖3:係本發明各該防護盒之操作流程圖。 Figure 3: The operation flow chart of each protective box of the present invention.

圖4:係本發明物聯網防護盒控管流程圖。 Figure 4: It is a flow chart of the control and management of the IoT protection box of the present invention.

圖5:係本發明物聯網防護盒之決策流程圖。 Figure 5: is the decision flow chart of the IoT protection box of the present invention.

圖6:係本發明物廣域網路防護盒之決策流程圖。 Fig. 6: The decision flow chart of the wide area network protection box of the present invention.

圖7:係本發明終端防護盒之決策流程圖。 Figure 7: The decision-making flow chart of the terminal protection box of the present invention.

請參閱圖1及圖3所示,本發明係有關於一種網路安全防護方法,係包括:將至少一物聯設備(IoT)連接至一物聯網防護盒(10);於該物聯網防護盒(10)與廣域網路(WAN)間連接至少一廣域網路防護盒(20),並令該廣域網路防護盒(20)透過該廣域網路連接至一終端平台(30);其中該物聯網防護盒(10)係內建至少一演算法(AI algorithms),而該廣域網路防護盒(20)內建有至少兩種演算法(AI algorithms),令該物聯網防護盒(10)蒐集所接收之資訊後進行演算,產生一參數(a2),並將該資訊傳遞至該廣域網路防護盒(20),且該廣域網路防護盒(20)將該物聯網防護盒(10)所輸入之資訊與其本身所蒐集的資訊透過其內建演算法演算後產生一參數(b1),以對該物聯網防護盒(10)提供資訊並進行更新,並且該物聯網防護盒(10)可將該物聯網防護盒(10)所得之參數(a2)與該廣域網路防護盒(20)之參數(b1)進行分析,擇一作為決策依據,用以有效阻擋惡意訊號的攻擊或發散。 Please refer to Figures 1 and 3, the present invention relates to a network security protection method, which includes: connecting at least one Internet of Things (IoT) device to an Internet of Things protection box (10); At least one wide area network protection box (20) is connected between the box (10) and the wide area network (WAN), and the wide area network protection box (20) is connected to a terminal platform (30) through the wide area network; wherein the Internet of Things protection The box (10) has at least one built-in algorithm (AI algorithms), and the wide area network protection box (20) has at least two built-in algorithms (AI algorithms), so that the IoT protection box (10) collects the received After calculating the information, generate a parameter (a2), and transmit the information to the WAN protection box (20), and the WAN protection box (20) will input the information from the IoT protection box (10) The information collected by itself is calculated by its built-in algorithm to generate a parameter (b1) to provide information and update the IoT protection box (10), and the IoT protection box (10) can The parameters (a2) obtained by the networked protection box (10) and the parameters (b1) of the wide area network protection box (20) are analyzed, and one of them is selected as a decision basis to effectively block the attack or divergence of malicious signals.

如圖2、圖3所示,本發明所揭示之網路安全防護方法,進一步於該廣域網路防護盒(20)與終端平台(30)間連接至少一終端防護盒(40),令該終端防護盒(40)內建至少一演算法(AI algorithms),且可蒐集其周圍連接之資訊及該廣域網路防護盒(20)所蒐集之資訊,並令該終端防護盒(40)經演算法演算後產生參數(a、b),該參數(b)係用以更新該廣域網路防護盒(20)之資訊,而該廣域網路防 護盒(20)經判別、篩選該終端防護盒(40)之參數(a)後產生一參數(a1),以供該物聯網防護盒(10)進行資料更新。 As shown in Figures 2 and 3, the network security protection method disclosed in the present invention further connects at least one terminal protection box (40) between the wide area network protection box (20) and the terminal platform (30) to make the terminal The protective box (40) is built-in at least one algorithm (AI algorithms), and can collect the information of its surrounding connections and the information collected by the WAN protective box (20), and make the terminal protective box (40) perform the algorithm After the calculation, the parameters (a, b) are generated. The parameter (b) is used to update the information of the WAN protection box (20), and the WAN protection The protective box (20) generates a parameter (a1) after discriminating and screening the parameter (a) of the terminal protective box (40) for data update of the IoT protective box (10).

如圖3所示,上述該物聯網防護盒(10)蒐集所接收之資訊是指源自周圍的無線訊號,例如3G/4G/5G訊號、WiFi或藍牙等無線訊號,當然也可以是所連接的有線訊號,本發明並不予自限。 As shown in Figure 3, the information collected by the IoT protective box (10) refers to wireless signals from the surroundings, such as 3G/4G/5G signals, WiFi or Bluetooth, etc., of course, it can also be connected The present invention is not self-limiting.

本發明所揭示之物聯網防護盒(10)所連接之物聯設備(IoT)是指可連接區域網路(LAN)的電子設備,如平板電腦、筆電或行動電話等行動裝置;或如冰箱、電視、冷氣等家電產品;或監視器、門鎖等保全裝置或如汽車、自動販賣機、...等等,本發明並不予自限該物聯設備(IoT)的種類。 The Internet of Things (IoT) connected to the IoT protective box (10) disclosed in the present invention refers to an electronic device that can be connected to a local area network (LAN), such as a mobile device such as a tablet, a laptop or a mobile phone; or Home appliances such as refrigerators, TVs, and air conditioners; or security devices such as monitors, door locks, or automobiles, vending machines, etc., the present invention does not limit the types of IoT devices.

本發明所揭示之廣域網路防護盒(20),係可蒐集周圍所連接的資訊,該資訊是可指所連接之廣域網路狀態或源自廣域網路所提供的訊息,如傳輸速度、連接之IP、上傳次數、連網時間、連接設備的資訊(例如品牌、上網連結搜尋紀錄)...等等,本發明並不予自限。上述該終端防護盒(40)所蒐集之周圍連接資訊,是可指由外部設備廠商所提供的監控資訊參數(SOC)、公開的監控訊息參數、網路設備資訊...等等,本發明並不自限該終端防護盒(40)所蒐集之資訊種類或形式。 The wide area network protection box (20) disclosed in the present invention can collect information about the surrounding connection, which can refer to the state of the connected wide area network or the information provided by the wide area network, such as transmission speed, connected IP , The number of uploads, the time of connection to the Internet, the information of the connected device (such as the brand, the search record of Internet links)... etc., the present invention is not self-limiting. The surrounding connection information collected by the terminal protection box (40) may refer to monitoring information parameters (SOC), public monitoring information parameters, network equipment information... etc. provided by external equipment manufacturers. It does not limit the type or form of information collected by the terminal protection box (40).

如圖3所示,本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)係提取該終端防護盒(40)所產生可供該物聯網防護盒(10)利用的參數(a)並予以判別、篩選後產生一可供物聯網防護盒(10)利用的參數(a1),並將該參數(a1)傳送至該物聯網防護盒(10)。 As shown in Figure 3, in the network security protection method disclosed in the present invention, the wide area network protection box (20) extracts the parameters generated by the terminal protection box (40) that can be used by the IoT protection box (10) (a) After discrimination and screening, a parameter (a1) that can be used by the IoT protective box (10) is generated, and the parameter (a1) is transmitted to the IoT protective box (10).

如圖4所示,本發明所揭示之網路安全防護方法,係對該物聯網防護盒(10)所產生的參數(a2)與該廣域網路防護盒(20)所產生的參數(b1)進行比較,令兩參數(a2)、(b1)落於不同區間時,係以該廣域網路防護盒(20)所產生的 參數(b1)作為決策依據,令兩參數(a2)、(b1)落於相同區間時,則以該物聯網防護盒(10)所產生的參數(a2)作為決策依據。 As shown in Figure 4, the network security protection method disclosed in the present invention is a parameter (a2) generated by the IoT protection box (10) and a parameter (b1) generated by the WAN protection box (20) For comparison, when the two parameters (a2) and (b1) fall in different intervals, they are generated by the WAN protection box (20) The parameter (b1) is used as the basis for decision-making, and when the two parameters (a2) and (b1) fall in the same interval, the parameter (a2) generated by the IoT protective box (10) is used as the basis for decision-making.

如圖4所示,本發明所揭示之網路安全防護方法,其中令該物聯網防護盒(10)所取得該廣域網路防護盒(20)所產生之該參數(b1)時間大於一預定值時,係以該物聯網防護盒(10)所產生的參數(a2)作為決策依據。上述之預定值可依使用者之需求設定,例如1毫秒,本發明並不予自限。 As shown in FIG. 4, the network security protection method disclosed in the present invention, wherein the time of the parameter (b1) generated by the WAN protection box (20) obtained by the IoT protection box (10) is greater than a predetermined value At this time, the parameter (a2) generated by the IoT protective box (10) is used as the basis for decision-making. The above-mentioned predetermined value can be set according to the user's needs, such as 1 millisecond, and the present invention is not self-limiting.

如圖4所示,本發明所揭示之網路安全防護方法,其中令該廣域網路防護盒(20)所產生之該參數(b1)時間大於該預定值時,令該廣域網路防護盒(20)將所產生之該參數(b1)進入排程,依排程時間對該物聯網防護盒(10)之內部資訊進行資訊更新。 As shown in FIG. 4, the network security protection method disclosed in the present invention, wherein when the time of the parameter (b1) generated by the WAN protection box (20) is greater than the predetermined value, the WAN protection box (20) ) Enter the generated parameter (b1) into the schedule, and update the internal information of the IoT protective box (10) according to the schedule time.

如圖5所示,本發明所揭示之網路安全防護方法,其中該物聯網防護盒(10)所得之各該參數(a2、b1),係可依業者之需求,將其區分為低風險區間、弱信心區間及高風險區間等三個區間,當然本發明並不自限劃分區間的數目。本發明令所得之該參數(a2、b1)落於弱信心區間時,係回報管理員做後續檢查分析;令所得之該參數(a2、b1)落於高風險區間時,關閉所對應有問題的物聯設備(IoT),令所得之該參數(a2、b1)落於低風險區間時僅作該筆資訊蒐集。由於當物聯網防護盒(10)判定所連接之訊號為高風險區間時,便可關閉對應節點的物聯設備(IoT),使有害訊號不會循物聯網防護盒(10)進入該廣域網路(WAN),可以將有害訊號封阻在區域網路(LAN)內,以提昇網路安全的防護效果。 As shown in Figure 5, in the network security protection method disclosed in the present invention, the parameters (a2, b1) obtained by the IoT protection box (10) can be classified as low-risk according to the needs of the industry There are three intervals: the interval, the weak confidence interval, and the high-risk interval. Of course, the present invention does not limit the number of intervals. In the present invention, when the obtained parameter (a2, b1) falls within the weak confidence interval, it is reported to the administrator to perform follow-up inspection and analysis; when the obtained parameter (a2, b1) falls within the high risk interval, the corresponding problem is closed When the parameters (a2, b1) are in the low-risk range, only the information is collected for the Internet of Things (IoT). When the IoT protection box (10) determines that the connected signal is in a high-risk zone, the Internet of Things (IoT) of the corresponding node can be turned off, so that harmful signals will not enter the wide area network through the IoT protection box (10) (WAN), can block harmful signals in the local area network (LAN) to improve the protection effect of network security.

如圖6所示,本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)所得之參數(b1),係可依業者之需求,區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(b1)落於高風險區間時關閉所對應節點有問題的物聯網防護盒(10),令所得之該參數(b1)落於低風險區間時僅作該筆資訊蒐集。緣 此,當廣域網路防護盒(20)判定所連接之訊號為高風險區間時,便可關閉所對應的物聯網防護盒(10),使有害訊號不會循物聯網防護盒(10)再進入該廣域網路(WAN)的其他節點,使本發明可以將有害訊號進行封鎖,避免對終端平台(30)造成安全危害,以提昇網路安全的防護效果。 As shown in Figure 6, in the network security protection method disclosed in the present invention, the parameter (b1) obtained by the wide area network protection box (20) can be divided into a low-risk zone, a weak-confidence zone, and a zone according to the needs of the industry. High-risk interval. When the obtained parameter (b1) falls within the weak confidence interval, the administrator will do a follow-up inspection and analysis. When the obtained parameter (b1) falls within the high-risk interval, the corresponding node will be closed. The networked protection box (10) makes the obtained parameter (b1) fall within the low-risk range only for the information collection. edge Therefore, when the WAN protection box (20) determines that the connected signal is in a high-risk zone, the corresponding IoT protection box (10) can be closed so that harmful signals will not enter the IoT protection box (10) again The other nodes of the wide area network (WAN) enable the present invention to block harmful signals, avoid causing security hazards to the terminal platform (30), and improve the protection effect of network security.

如圖7所示,本發明所揭示之網路安全防護方法,其中該終端防護盒(40)所得之參數(a、b),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a、b)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a、b)落於高風險區間時關閉所對應節點有問題的廣域網路防護盒(20),令所得之該參數(a、b)落於低風險區間時僅作該筆資訊蒐集。如此,使本發明所揭示之終端防護盒(40)形成最後一道網路安全防線,以有效保護終端平台(30)的安全。 As shown in Figure 7, in the network security protection method disclosed in the present invention, the parameters (a, b) obtained by the terminal protection box (40) are divided into a low-risk interval, a weak confidence interval, and a high-risk interval, so that When the obtained parameters (a, b) fall within the weak confidence interval, the administrator will be reported to perform follow-up inspection and analysis, so that when the obtained parameters (a, b) fall within the high risk interval, the WAN with the corresponding node will be closed. The protective box (20) makes the obtained parameters (a, b) fall within the low-risk range only for the information collection. In this way, the terminal protection box (40) disclosed in the present invention forms the last network security line of defense to effectively protect the security of the terminal platform (30).

本發明所揭示之網路安全防護方法,其中該廣域網路防護盒(20)是可內建DPPO與A3C兩種演算法;而該物聯網防護盒(10)是內建DDPG演算法。該終端防護盒(40),是內建DPPO演算法。 In the network security protection method disclosed in the present invention, the wide area network protection box (20) can be built-in DPPO and A3C two algorithms; and the Internet of things protection box (10) is a built-in DDPG algorithm. The terminal protection box (40) has a built-in DPPO algorithm.

本發明所揭示之網路安全防護方法,該廣域網路防護盒(20)當A3C演算法無法收斂時,令該DPPO演算法介入輔其收斂,使本發明之處理速度可以更加迅速。 In the network security protection method disclosed in the present invention, when the wide area network protection box (20) fails to converge in the A3C algorithm, the DPPO algorithm is intervened to assist its convergence, so that the processing speed of the present invention can be faster.

如圖1、2所示,本發明之另一目的旨在揭示一種網路安全防護之裝置,係包含一物聯網防護盒(10),至少含有一輸入/輸出端(11),用以連接物聯設備(IoT),並內建至少一種演算法,令該物聯網防護盒(10)所蒐集之資訊經該演算法演算分析後產生一參數,並向外輸出,用以控制該物聯設備(IoT);以及一廣域網路防護盒(20),至少含有一輸入/輸入埠(21),用以連接於該物聯網防護盒(10)與一終端平台(30)間,並內建至少兩種演算法,令該廣域網路防護盒所蒐集 之資訊經各該演算法演算分析後產生至少一參數,並向外輸出至該物聯網防護盒(10)。 As shown in Figures 1 and 2, another object of the present invention is to disclose a network security protection device, which includes an IoT protection box (10), at least one input/output terminal (11) for connection The Internet of Things (IoT) device has at least one built-in algorithm, so that the information collected by the Internet of Things protection box (10) is calculated and analyzed by the algorithm to generate a parameter and output it to control the Internet of Things Equipment (IoT); and a wide area network protection box (20), which contains at least one input/input port (21) for connecting between the IoT protection box (10) and a terminal platform (30), and is built-in At least two algorithms to make the WAN protection box collected The information is calculated and analyzed by each algorithm to generate at least one parameter, and output to the IoT protective box (10).

如圖1、2所示,本發明所揭示網路安全防護之裝置,進一步包含一終端防護盒(40),至少含有一輸入/輸出端(42),用以連接於該廣域網路防護盒(20)與該終端平台(30)間,並內建至少一種演算法,令該終端防護盒(40)所蒐集之資訊經該演算法演算後產生至少一參數,並向外輸出至該廣域網路防護盒(20)。 As shown in Figures 1 and 2, the network security protection device disclosed in the present invention further includes a terminal protection box (40), which contains at least one input/output terminal (42) for connecting to the wide area network protection box ( 20) At least one algorithm is built in between the terminal platform (30), and the information collected by the terminal protection box (40) is calculated by the algorithm to generate at least one parameter, and output to the wide area network. Protective box (20).

本發明所揭示網路安全防護之方法,係在物聯設備(IoT)與廣域網路(WAN)間藉由物聯網防護盒(10)將有安全疑慮的物聯設備(IoT)所發出的訊號進行阻擋或關閉該物聯設備(IoT),使有安全疑慮的訊號可以封閉在區域網路(LAN),而不進入廣域網路(WAN);另外在進入廣域網路(WAN)及進入終端平台(30)前,藉由廣域網路防護盒(20)及終端防護盒(40)兩道安全防護牆,分別對可疑訊號、攻擊進行阻擋,以提高網路安全防護的可靠性。 The method of network security protection disclosed in the present invention is a signal sent by an IoT device (IoT) with security concerns through the IoT protection box (10) between the Internet of Things (IoT) and the Wide Area Network (WAN) Block or turn off the Internet of Things (IoT), so that signals with security concerns can be closed on the local area network (LAN) instead of entering the wide area network (WAN); in addition, when entering the wide area network (WAN) and entering the terminal platform ( Before 30), the two security walls of the wide area network protection box (20) and the terminal protection box (40) were used to block suspicious signals and attacks to improve the reliability of network security protection.

本發明所揭示網路安全防護之方法,其中該物聯設備(IoT)、廣域網路防護盒(20)與終端防護盒(40)間,可以將彼此所蒐集的資訊列為演算的基礎,使演算結果可以更為精準、快速。 The method for network security protection disclosed in the present invention, wherein the Internet of Things (IoT), wide area network protection box (20) and terminal protection box (40) can use the information collected by each other as the basis of calculation, so that The calculation results can be more accurate and faster.

本發明所揭示之方法及裝置,可於不違本發明之精神、範疇下予以修飾應用,並不自限於上述實施方式。 The methods and devices disclosed in the present invention can be modified and applied without violating the spirit and scope of the present invention, and are not limited to the above-mentioned embodiments.

Claims (10)

一種網路安全防護方法,係包括:將至少一物聯設備連接至一物聯網防護盒,其中該物聯網防護盒可對周圍的無線訊號或所連接的有線訊號進行資訊蒐集;於該物聯網防護盒與廣域網路間連接至少一廣域網路防護盒,並令該廣域網路防護盒透過該廣域網路連接至一終端平台,其中該廣域網路防護盒可蒐集所連接之廣域網路狀態或源自廣域網路所提供的資訊;其中該物聯網防護盒內建一DDPG演算法,而該廣域網路防護盒內建DPPO與A3C演算法,令該物聯網防護盒蒐集所接收之資訊後以該DDPG演算法進行演算,產生一參數(a2),並將該資訊傳遞至該廣域網路防護盒,且令該廣域網路防護盒將該物聯網防護盒所輸入之資訊與其本身所蒐集的資訊透過其內建該DPPO或該A3C演算法演算後產生一參數(b1),以取得該參數(b1)所對應的資訊對該物聯網防護盒更新資訊,並且該物聯網防護盒將該物聯網防護盒所得之參數(a2)與該廣域網路防護盒之參數(b1)進行分析,擇一作為決策依據,用以阻擋惡意訊號攻擊或發散;其中令該廣域網路防護盒當以A3C演算法無法收斂時,即以該DPPO演算法介入輔其收斂,另令該物聯網防護盒所取得該廣域網路防護盒所產生之該參數(b1)時間大於一預定值時,係以該物聯網防護盒所產生的參數(a2)作為決策依據。 A network security protection method includes: connecting at least one IoT device to an IoT protection box, wherein the IoT protection box can collect information from surrounding wireless signals or connected wired signals; At least one WAN protection box is connected between the protection box and the WAN, and the WAN protection box is connected to a terminal platform through the WAN, wherein the WAN protection box can collect the connected WAN status or originate from the WAN The information provided; where the IoT protection box has a built-in DDPG algorithm, and the WAN protection box has built-in DPPO and A3C algorithms, so that the IoT protection box collects the received information and then uses the DDPG algorithm Calculate, generate a parameter (a2), and transmit the information to the WAN protection box, and make the WAN protection box the information input by the IoT protection box and the information collected by itself through its built-in DPPO Or, after the A3C algorithm is calculated, a parameter (b1) is generated to obtain the information corresponding to the parameter (b1) to update the information of the IoT protection box, and the IoT protection box is the parameter obtained by the IoT protection box ( a2) Analyze the parameters (b1) of the WAN protection box, and choose one as the basis for decision-making to block malicious signal attacks or divergence; when the WAN protection box cannot be converged by the A3C algorithm, the The DPPO algorithm intervenes to assist its convergence. In addition, when the time of the parameter (b1) generated by the WAN protection box obtained by the IoT protection box is greater than a predetermined value, the parameter (a2) generated by the IoT protection box is used. ) As the basis for decision-making. 如請求項1所述之網路安全防護方法,進一步於該廣域網路防護盒所連接的廣域網路與該終端平台間連接至少一終端防護盒,令該終 端防護盒內建有一DPPO演算法,且可蒐集其周圍連接之資訊及該廣域網路防護盒所蒐集之資訊,並令該終端防護盒經演算法演算後產生參數(a、b),並傳遞至該廣域網路防護盒,其中該參數(a)經該廣域網路防護盒傳送至該物聯網防護盒以進行資料更新,而該參數(b)係用以更新該廣域網路防護盒之資訊,其中該終端防護盒可蒐集其周圍連接之資訊是指由外部設備廠商所提供的監控資訊參數(SOC)、公開的監控訊息參數或網路設備資訊。 According to the network security protection method of claim 1, further connecting at least one terminal protection box between the wide area network connected to the wide area network protection box and the terminal platform, so that the terminal The terminal protection box has a built-in DPPO algorithm, and can collect the information of its surrounding connections and the information collected by the WAN protection box, and make the terminal protection box generate parameters (a, b) after the algorithm calculation, and transmit To the WAN protection box, wherein the parameter (a) is sent to the IoT protection box via the WAN protection box for data update, and the parameter (b) is used to update the information of the WAN protection box, where The terminal protection box can collect the information of its surrounding connections, which refers to the monitoring information parameters (SOC) provided by the external equipment manufacturer, the public monitoring information parameters or the network equipment information. 如請求項2所述之網路安全防護方法,其中該廣域網路防護盒經判別、篩選該終端防護盒之參數(a)後產生一參數(a1),以供該物聯網防護盒(10)進行資料更新。 The network security protection method according to claim 2, wherein the wide area network protection box is judged, and the parameter (a) of the terminal protection box is screened to generate a parameter (a1) for the IoT protection box (10) Update the information. 如請求項1所述之網路安全防護方法,其中該物聯網防護盒所得之各該參數(a2、b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a2、b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a2、b1)落於高風險區間時關閉所對應有問題的物聯設備,令所得之該參數(a2、b1)落於低風險區間時僅作該筆資訊蒐集。 The network security protection method according to claim 1, wherein each parameter (a2, b1) obtained by the IoT protection box is divided into a low-risk interval, a weak confidence interval and a high-risk interval, so that the obtained parameter When (a2, b1) falls within the weak confidence interval, the administrator will be reported to perform follow-up inspection and analysis. When the obtained parameters (a2, b1) fall within the high-risk interval, the corresponding problematic IoT device will be shut down, and the result will be When the parameters (a2, b1) fall in the low-risk range, only the information is collected. 如請求項1所述之網路安全防護方法,其中該廣域網路防護盒所得之參數(b1),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(b1)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(b1)落於高風險區間時關閉所對應有問題的物聯網防護盒,令所得之該參數(b1)落於低風險區間時僅作該筆資訊蒐集。 The network security protection method according to claim 1, wherein the parameter (b1) obtained by the wide area network protection box is divided into a low-risk interval, a weak confidence interval and a high-risk interval, so that the obtained parameter (b1) falls In the weak confidence interval, the administrator is reported to do a follow-up inspection and analysis, and when the obtained parameter (b1) falls in the high-risk interval, the corresponding problematic IoT box is closed, so that the obtained parameter (b1) falls on In the low-risk zone, only this piece of information is collected. 如請求項2所述之網路安全防護方法,其中該終端防護盒所得之參數(a、b),係區分為低風險區間、弱信心區間及高風險區間,令所得之該參數(a、b)落於弱信心區間時,係回報管理員做後續檢查分析,令所得之該參數(a、b)落於高風險區間時關閉所對應之廣域網路防護盒,令所得之該參數(a、b)落於低風險區間時僅作該筆資訊蒐集。 The network security protection method according to claim 2, wherein the parameters (a, b) obtained by the terminal protection box are divided into a low-risk interval, a weak confidence interval and a high-risk interval, so that the obtained parameters (a, b) b) When it falls in the weak confidence zone, the administrator will be reported to perform follow-up inspection and analysis. When the obtained parameter (a, b) falls in the high-risk zone, the corresponding WAN protection box will be closed, and the obtained parameter (a 、B) Only collect the information when it falls in the low-risk zone. 如請求項4所述之網路安全防護方法,係對該物聯網防護盒所產生的參數(a2)與該廣域網路防護盒所產生的參數(b1)進行比較,令兩參數(a2)、(b1)落於不同區間時,係以該廣域網路防護盒所產生的參數(b1)作為決策依據,令兩參數(a2)、(b1)落於相同區間時,則以該物聯網防護盒所產生的參數(a2)作為決策依據。 The network security protection method described in claim 4 is to compare the parameter (a2) generated by the IoT protection box with the parameter (b1) generated by the WAN protection box, so that the two parameters (a2), (b1) When falling in different intervals, the parameter (b1) generated by the WAN protection box is used as the decision basis. When the two parameters (a2) and (b1) fall in the same interval, the IoT protection box The generated parameter (a2) is used as the basis for decision-making. 如請求項1所述之網路安全防護方法,其中令該廣域網路防護盒所產生之該參數(b1)時間大於該預定值時,將該廣域網路防護盒所產生之該參數(b1)係進入排程更新該物聯網防護盒之內部資訊。 The network security protection method according to claim 1, wherein when the time of the parameter (b1) generated by the WAN protection box is greater than the predetermined value, the parameter (b1) generated by the WAN protection box is Enter the schedule to update the internal information of the IoT protection box. 一種網路安全防護之裝置,係包含一物聯網防護盒,至少含有一輸入/輸出端,用以連接物聯設備,並內建DDPG演算法,令該物聯網防護盒所蒐集之資訊經該DDPG演算法演算分析後產生至少一參數並向外輸出,用以控制該物聯設備;以及一廣域網路防護盒,至少含有一輸入埠及一輸出埠,用以連接於該物聯網防護盒與一終端平台間,並內建DPPO與A3C演算法,令該廣域網路防護盒所蒐集之資訊經DPPO或A3C演算法演算分析後產 生至少一參數,並將該參數向外輸出至該物聯網防護盒;其中令該廣域網路防護盒當以A3C演算法無法收斂時,即以該DPPO演算法介入輔其收斂,另令該物聯網防護盒所取得該廣域網路防護盒所產生之該參數時間大於一預定值時,係以該物聯網防護盒所產生的參數作為決策依據。 A device for network security protection includes an IoT protection box, at least one input/output terminal for connecting to IoT devices, and a built-in DDPG algorithm to allow the information collected by the IoT protection box to pass through the After the DDPG algorithm is calculated and analyzed, at least one parameter is generated and output externally to control the IoT device; and a wide area network protection box containing at least one input port and one output port for connecting the IoT protection box and Between a terminal platform, the DPPO and A3C algorithms are built in, so that the information collected by the WAN protection box is produced after the calculation and analysis of the DPPO or A3C algorithm Generate at least one parameter, and output the parameter to the IoT protection box. When the WAN protection box cannot be converged by the A3C algorithm, the DPPO algorithm is used to assist its convergence, and the thing is When the time of the parameter generated by the WAN protection box obtained by the networked protection box is greater than a predetermined value, the parameter generated by the IoT protection box is used as a decision basis. 如請求項9所述網路安全防護之裝置,進一步包含一終端防護盒,至少含有一輸入/輸出端,用以連接於該廣域網路防護盒所連接的廣域網路與該終端平台間,並內建一DPPO演算法,令該輸入端所蒐集之資訊經該DPPO演算法演算後產生至少一參數,由輸出端向外輸出至該廣域網路防護盒。The device for network security protection according to claim 9, further comprising a terminal protection box including at least one input/output terminal for connecting between the wide area network connected to the wide area network protection box and the terminal platform, and internal A DPPO algorithm is built, and the information collected by the input terminal is calculated by the DPPO algorithm to generate at least one parameter, and the output terminal is output to the WAN protection box.
TW109132530A 2020-09-21 2020-09-21 A method and apparatus for network security TWI727891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW109132530A TWI727891B (en) 2020-09-21 2020-09-21 A method and apparatus for network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW109132530A TWI727891B (en) 2020-09-21 2020-09-21 A method and apparatus for network security

Publications (2)

Publication Number Publication Date
TWI727891B true TWI727891B (en) 2021-05-11
TW202213385A TW202213385A (en) 2022-04-01

Family

ID=77036398

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109132530A TWI727891B (en) 2020-09-21 2020-09-21 A method and apparatus for network security

Country Status (1)

Country Link
TW (1) TWI727891B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180191675A1 (en) * 2016-12-30 2018-07-05 Fortinet, Inc. Security Fabric for Internet of Things (IOT)
TW201830921A (en) * 2017-02-10 2018-08-16 美商高通公司 Systems and methods for network monitoring
CN110612703A (en) * 2017-03-15 2019-12-24 Abb瑞士股份有限公司 Gateway Configuration in Industrial IoT
CN110830287A (en) * 2019-09-27 2020-02-21 西北大学 Internet of things environment situation sensing method based on machine learning
CN111294365A (en) * 2020-05-12 2020-06-16 腾讯科技(深圳)有限公司 Attack flow protection system, method and device, electronic equipment and storage medium
CN111510433A (en) * 2020-03-18 2020-08-07 山东大学 A method for detecting malicious traffic in Internet of Things based on fog computing platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180191675A1 (en) * 2016-12-30 2018-07-05 Fortinet, Inc. Security Fabric for Internet of Things (IOT)
TW201830921A (en) * 2017-02-10 2018-08-16 美商高通公司 Systems and methods for network monitoring
CN110612703A (en) * 2017-03-15 2019-12-24 Abb瑞士股份有限公司 Gateway Configuration in Industrial IoT
CN110830287A (en) * 2019-09-27 2020-02-21 西北大学 Internet of things environment situation sensing method based on machine learning
CN111510433A (en) * 2020-03-18 2020-08-07 山东大学 A method for detecting malicious traffic in Internet of Things based on fog computing platform
CN111294365A (en) * 2020-05-12 2020-06-16 腾讯科技(深圳)有限公司 Attack flow protection system, method and device, electronic equipment and storage medium
CN111294365B (en) 2020-05-12 2020-08-18 腾讯科技(深圳)有限公司 Attack flow protection system, method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
TW202213385A (en) 2022-04-01

Similar Documents

Publication Publication Date Title
Pan et al. Context aware intrusion detection for building automation systems
Kumar et al. A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing
US11522887B2 (en) Artificial intelligence controller orchestrating network components for a cyber threat defense
Rubio et al. Current cyber-defense trends in industrial control systems
CN114584405A (en) Electric power terminal safety protection method and system
JP5248612B2 (en) Intrusion detection method and system
CN111245793A (en) Anomaly analysis method and device for network data
Rubio et al. Analysis of Intrusion Detection Systems in Industrial Ecosystems.
EP4111665A1 (en) Cyber security for a software-as-a-service factoring risk
CN110602041A (en) White list-based Internet of things equipment identification method and device and network architecture
CN116760636A (en) An active defense system and method for unknown threats
CN111181971B (en) System for automatically detecting industrial network attack
US20150358292A1 (en) Network security management
Wang et al. Source-based defense against DDoS attacks in SDN based on sFlow and SOM
CN114244728A (en) Network security situation evaluation and prediction method based on multi-factor layering
CN118018231A (en) Security policy management method, device, equipment and storage medium for isolation zone
CN120321033B (en) AI-based dynamic security risk assessment and intelligent response system and method
CN111224973A (en) Network attack rapid detection system based on industrial cloud
CN119182599A (en) Equipment access authentication method, device, equipment and storage medium
CN117692251A (en) A processor network security defense system and method
CN116962052A (en) Network security monitoring methods, devices, equipment, media and computer program products
CN118862063A (en) A security detection system, method, device and medium for a large model of government affairs industry
Turcato et al. A cloud-based method for detecting intrusions in profinet communication networks based on anomaly detection
Arifin et al. The trends of supervisory control and data acquisition security challenges in heterogeneous networks
CN113569236B (en) A method and system for monitoring and protecting security of an Internet of Things terminal