Font Size: a A A

Search And Analyze Physical Objects Based On The Internet

Posted on:2016-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:J F FengFull Text:PDF
GTID:2348330536467388Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In 1991,the concept of Internet of things was put forward,which caused a revolution of the Internet and thus people's daily life are closely connected to the Internet with the implementing of Smart Homes,critical national infrastructure and industry equipment to the Internet by Intelligent Transportation System,Smart Grid and Industry 4.0.Connection of more and more physical objects to the Internet brings not only great changes to our life and industry,but also many security threats.New network attacks,such as ATP,use people as breakthrough point,damage physical objects in industrial control network via the Internet.Under this background,the research of network security also breaks the traditional information domain and comes into a multi-domain model,which includes Cyber,Physical and Social domain.Searching and finding physical objects in the Internet helps to know more about their distribution and deployment.Describing physical objects in CPS multi-domain model is also good for fully depicting them and analyzing possible existence of cross-domain threats.This paper proposes a way to search and analyze physical objects in the Internet.The key technologies include:1.Using common application layer protocols and Web pages to search physical objects.By sending protocols' handshake messages to the ports in Internet's IP and extracting key words in the message,we analyze the possible physical objects in the Internet.For those physical objects using Web page as accessing and controlling interface,we extract features of these Web pages by experimental data statistics and analysis.We also analyze the physical objects' information form common application layer protocols by the quantitative statistics in the experiments.What's more,the vulnerability of some physical objects which require authentication to access is also analyzed and verified by experiments.2.Using a variety of means to expand physical objects' information.After finding physical objects,we expand their information to multi-domain via IP address information,product information,and organization information.Meanwhile,we extract key words from information we've got,and use traditional search engine to find more information with these key words.At last,we expand these information from Cyber domain to Physical domain and Social domain?3.Proposing a multi-domain model for physical objects.We divide information we've got by the above methods into cyber domain,physical domain and social domain,depict physical objects from different views,and represent them in Cyber network,Physical network and Social networks.Then on this basis,we qualitatively analyze the relationship among physical objects in multi-domain model.Finally we develop a proto type system named Net Thing by using the methods we have proposed in this paper.In this system,we store the structured information and provide a query interface for users.We verify the feasibility of the method by experiments,prove the existence of many physical objects in the Internet and analyze the potential security threats.
Keywords/Search Tags:physical objects, network security, multi domain, Internet, search and analyze
PDF Full Text Request
Related items