Font Size: a A A

Research On Information Security Protection Technology Of Industrial Internet Of Things

Posted on:2019-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:B WangFull Text:PDF
GTID:2348330569495605Subject:Engineering
Abstract/Summary:PDF Full Text Request
Industrial Internet of Things(IIoT)is a fusion of industrial automation system and Internet of Things(IoT)system.It features comprehensive sensing,interconnection transmission,intelligent processing,self-organization and self-maintenance,and it is applied to many fields such as intelligent transportation,smart factories,smart grids and environment detection.With the widespread application of IIoT technology,the cybersecurity threats to IIoT systems are increasing day by day,and information security has become a major challenge in the development of IIoT.In order to protect the IIoT system from the cyberattack,this paper makes an in-depth study on the IoT information security technology and design the defense strategy for IIoT.The main work is as follows:This paper analyzes the current situation of security research of IIo T system at home and abroad,then studies the typical architecture of IIo T system.According to the different levels of the architecture of the system,this paper analyzes the network security threats to the current IIoT system in detail.For various security threats faced by IIo T system,combining with specific cyberattacks,this paper designs targeted security protection strategies applied to different levels of architecture,including security protection strategies for data acquisition layer,data transmission layer,and data processing layers.Each protection method mentioned above is designed and implemented separately in this paper.In data acquisition layer,port scan detection,brute force detection,and linkage defense with firewall protection are combined to prevent the terminal devices from being infected by IoT botnet viruses such as Mirai.In data transmission layer,TLS is used to encrypt data and X509 certificates are used for identity authentication to defense against data theft and man-in-the-middle attacks.In data processing layer,deep packet inspection method based on whitelist is used to restrict access to the communication server,and the abnormal traffic detection method based on Na?ve Bayes classifier is used to monitor the traffic flow in real time.After the experimental test,each of the protection methods can effectively prevent related network attacks and ensure the safe and stable operation of IIoT systems.
Keywords/Search Tags:industrial Internet of Things (IIoT), IoT botnet viruses, deep packet inspection, Naive Bayes classifier, abnormal traffic detection
PDF Full Text Request
Related items