[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112182574A - Method and device for intrusion detection and server - Google Patents

Method and device for intrusion detection and server Download PDF

Info

Publication number
CN112182574A
CN112182574A CN202010949629.6A CN202010949629A CN112182574A CN 112182574 A CN112182574 A CN 112182574A CN 202010949629 A CN202010949629 A CN 202010949629A CN 112182574 A CN112182574 A CN 112182574A
Authority
CN
China
Prior art keywords
information
household appliance
intrusion
control request
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010949629.6A
Other languages
Chinese (zh)
Inventor
赵越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202010949629.6A priority Critical patent/CN112182574A/en
Publication of CN112182574A publication Critical patent/CN112182574A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/658Incremental updates; Differential updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to the technical field of communication, and discloses a method for intrusion detection, which is applied to a service server side. The method comprises the following steps: acquiring a connection request; acquiring the information of the household appliance according to the connection request; sending the household appliance information to a user terminal, and triggering a feedback control request of the user terminal; and receiving the control request, sending the control request to the household appliances corresponding to the household appliance information, triggering the household appliances to carry out intrusion detection and feeding back intrusion information to a security server. The control request is acquired and the control instruction is acquired according to the control request, and the control request is sent to the household appliance, so that the household appliance is triggered to carry out intrusion detection, and the safety of the household appliance is improved. The application also discloses a device and a server for intrusion detection.

Description

Method and device for intrusion detection and server
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for intrusion detection, and a server.
Background
With the gradual development of the internet of things, internet of things equipment manufacturers gradually realize the risk caused by the intrusion of the terminal, so that the security of the starting process and the communication process of the household appliance equipment is ensured by means of a trusted technology, encrypted communication and the like.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art: the existing household appliance is more focused on function realization, but the invasion behavior by the self loophole of a household appliance control program cannot be detected, so that the intelligent household appliance is exposed to risks.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method, a device and equipment for intrusion detection, so as to carry out intrusion detection on household appliances and improve the safety of the equipment.
In some embodiments, the method for intrusion detection is applied to a service server side, and includes:
acquiring a connection request;
acquiring the information of the household appliance according to the connection request;
sending the household appliance information to a user terminal, and triggering a feedback control request of the user terminal;
receiving the control request, sending the control request to the household appliances corresponding to the household appliance information, triggering the household appliances to carry out intrusion detection and feeding back intrusion information to a security server;
the intrusion information comprises household appliance system information and/or a first system calling sequence; the home appliance system information includes one or more of home appliance memory information, a home appliance control program stack, and home appliance system configuration information.
In some embodiments, obtaining the home device information according to the connection request includes:
connecting with the user terminal according to the connection request;
matching the household appliance information corresponding to the connection request in a preset equipment information table under the condition of successful connection with the user terminal;
the device information table includes a correspondence between the connection request and the home device information.
In some embodiments, triggering the home device for intrusion detection includes:
and triggering the household appliance to acquire a first system calling sequence according to the control request, and carrying out intrusion detection according to the first system calling sequence.
In some embodiments, performing intrusion detection according to the first system call sequence includes:
and under the condition that the first system calling sequence meets a preset condition, determining that the control request is an illegal control request.
In some embodiments, further comprising:
acquiring a control instruction according to the control request;
and sending the control instruction to the household appliance, and triggering the household appliance to execute the control instruction.
In some embodiments, obtaining control instructions according to the control request includes:
matching a control instruction corresponding to the control request from a preset control instruction database according to the control request;
the control instruction database stores the corresponding relation between the control request and the control instruction.
The method for intrusion detection provided by the embodiment of the disclosure is applied to a security server side, and comprises the following steps:
acquiring intrusion information, wherein the intrusion information comprises household appliance system information and/or a first system calling sequence; the household appliance system information comprises one or more of household appliance memory information, a household appliance control program stack and household appliance system configuration information;
acquiring a security patch packet corresponding to the intrusion information according to the intrusion information;
and sending the security patch package to the household appliance equipment, and triggering the household appliance equipment to upgrade according to the security patch package.
In some embodiments, obtaining a security patch package corresponding to the intrusion information according to the intrusion information includes:
matching a security patch package corresponding to the intrusion information in a preset security patch package database;
and the security patch packet database stores the corresponding relationship between the intrusion information and the security patch packet.
In some embodiments, the apparatus for intrusion detection comprises a processor and a memory storing program instructions, the processor being configured to, when executing the program instructions, perform the method for intrusion detection described above.
In some embodiments, the apparatus comprises the above-described apparatus for intrusion detection.
The method, the device and the server for controlling the household appliance provided by the embodiment of the disclosure can achieve the following technical effects: the control request is acquired and the control instruction is acquired according to the control request, and the control request is sent to the household appliance, so that the household appliance is triggered to carry out intrusion detection, and the safety of the household appliance is improved.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the accompanying drawings and not in limitation thereof, in which elements having the same reference numeral designations are shown as like elements and not in limitation thereof, and wherein:
FIG. 1 is a schematic diagram of a method for intrusion detection provided by embodiments of the present disclosure;
FIG. 2 is a timing diagram of a method for intrusion detection provided by embodiments of the present disclosure;
FIG. 3 is a timing diagram of another method for intrusion detection provided by embodiments of the present disclosure;
FIG. 4 is a timing diagram of a method for obtaining a sequence set of system calls according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of an apparatus for intrusion detection provided by embodiments of the present disclosure;
fig. 6 is a schematic diagram of a system for intrusion detection according to an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and elements of the disclosed embodiments can be understood in detail, a more particular description of the disclosed embodiments, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
The terms "first," "second," and the like in the description and in the claims, and the above-described drawings of embodiments of the present disclosure, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure described herein may be made. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The term "plurality" means two or more unless otherwise specified.
In the embodiment of the present disclosure, the character "/" indicates that the preceding and following objects are in an or relationship. For example, A/B represents: a or B.
The term "and/or" is an associative relationship that describes objects, meaning that three relationships may exist. For example, a and/or B, represents: a or B, or A and B.
Referring to fig. 1, an embodiment of the present disclosure provides a method for intrusion detection, applied to a service server side, including:
step S101, acquiring a connection request;
step S102, acquiring the information of the household appliance according to the connection request;
step S103, sending the household appliance information to the user terminal, and triggering a feedback control request of the user terminal;
step S104, receiving the control request, sending the control request to the household appliances corresponding to the household appliance information, triggering the household appliances to carry out intrusion detection and feeding back intrusion information to the security server; the intrusion information comprises system information of the household electrical appliance and/or a first system calling sequence; the home appliance system information includes one or more of home appliance memory information, a home appliance control program stack, and home appliance system configuration information.
By adopting the method for intrusion detection provided by the embodiment of the disclosure, the control request is obtained and the control instruction is obtained according to the control request, and the control request is sent to the household appliance, so that the household appliance is triggered to perform intrusion detection, and the safety of the household appliance is improved.
Optionally, obtaining the home device information according to the connection request includes: connecting with the user terminal according to the connection request; matching the household appliance information corresponding to the connection request in a preset equipment information table under the condition of successful connection with the user terminal; the device information table includes a correspondence between the connection request and the home device information.
Optionally, the home device information comprises a user-controllable home device. For example: household appliances such as televisions, air conditioners, refrigerators and the like.
Optionally, triggering the home device to perform intrusion detection includes: and triggering the household appliance to acquire a first system calling sequence according to the control instruction, and carrying out intrusion detection according to the first system calling sequence.
In some embodiments, when a control request B sent by a user terminal is received, a control instruction B corresponding to the control request B is sent to the home appliance device, the home appliance device is triggered to execute the control instruction B, and a corresponding first system call sequence is obtained according to the control instruction B. For example, in the process of executing the control instruction b, the household appliance is triggered to acquire the first system call sequence r, the first system call sequence t and the first system call sequence y according to the control instruction b.
Optionally, performing intrusion detection according to the first system call sequence includes: and under the condition that the first system calling sequence meets the preset condition, determining the control request as an illegal intrusion request.
In some embodiments, the control request C is sent to the home appliance, the home appliance is triggered to perform intrusion detection, a first system call sequence corresponding to the control request C is obtained as a system call sequence r, a system call sequence t and a system call sequence y, the home appliance is triggered to compare the system call sequence r, the system call sequence t and the system call sequence y in a preset system call sequence set, and the control request C is determined to be an illegal control request under the condition that a second system call sequence which is the same as the first system call sequence r, t and y does not exist in the preset system call sequence set.
Optionally, the method further comprises: acquiring a control instruction according to the control request; and sending a control instruction to the household appliance, and triggering the household appliance to execute the control instruction.
Optionally, obtaining the control instruction according to the control request includes: matching a control instruction corresponding to the control request from a preset control instruction database according to the control request; the control instruction database stores the corresponding relation between the control request and the control instruction.
Optionally, a method for intrusion detection is applied to a secure server side, and includes: acquiring intrusion information, wherein the intrusion information comprises household appliance system information and/or a first system calling sequence; the household appliance system information comprises one or more of household appliance memory information, a household appliance control program stack and household appliance system configuration information; acquiring a security patch package corresponding to the intrusion information according to the intrusion information; and sending the security patch package to the household appliance, and triggering the household appliance to upgrade according to the security patch package.
Optionally, the memory information of the home appliance device is a memory occupation condition of the current home appliance device operating system.
Optionally, obtaining, according to the intrusion information, a security patch package corresponding to the intrusion information includes: matching a security patch package corresponding to the intrusion information in a preset security patch package database; the security patch package database stores the corresponding relationship between the intrusion information and the security patch package.
In some embodiments, the system information of the home appliance and the first system call sequence are received, and the intrusion comparison module matches the received system information of the home appliance and the first system call sequence in a preset security patch packet database to obtain a security patch packet corresponding to the system information of the home appliance and/or the first system call sequence; and sending the security patch package to the household appliance, and triggering the household appliance to install and upgrade according to the security patch package.
In this way, the household appliance is triggered to acquire the first system calling sequence corresponding to the control request, and the household appliance is triggered to detect the first system calling sequence, so that the intrusion detection of the household appliance is realized; and meanwhile, invasion information of the household appliance is acquired, the security patch package is acquired according to the invasion information and sent to the household appliance, and the household appliance is triggered to be installed and upgraded according to the security patch package, so that the security defects of the control program of the household appliance are acquired in time, the potential safety hazards of the household appliance are reduced, and the safety of the household appliance is improved. The embodiment of the present disclosure further provides a method for intrusion detection, which is applied to a home appliance side, and includes: acquiring a control instruction; acquiring a first system calling sequence according to the control instruction; and carrying out intrusion detection according to the first system calling sequence.
By acquiring the first system calling sequence corresponding to the control request and carrying out intrusion detection according to the first system calling sequence corresponding to the control request, whether the household appliance is invaded or not can be detected, and the safety of the household appliance is improved.
Optionally, performing intrusion detection according to the first system call sequence includes: and under the condition that the first system calling sequence meets the preset condition, determining the control request as an illegal control request.
Optionally, the first system call sequence is a system call sequence corresponding to the control request.
Optionally, determining that the control request is an illegal control request when the first system call sequence meets a preset condition, includes: and under the condition that no second system calling sequence which is the same as the first system calling sequence exists in the preset system calling sequence set, determining the control request as an illegal control request.
In some embodiments, in case the control request C is received by the appliance control program, it is converted into a fixed set of system call sequences, i.e. a first system call sequence, in the kernel of the appliance operating system, for example: the first system calling sequence is a system calling sequence r, a system calling sequence t and a system calling sequence y, the system calling sequence r, the system calling sequence t and the system calling sequence y are compared in a preset system calling sequence set, and if a second system calling sequence which is the same as the first system calling sequence r, t and y does not exist in the system calling sequence set, the control request C is determined to be an illegal control request.
Optionally, the obtaining the system call sequence set includes: and acquiring system calling sequences corresponding to all preset control requests, and respectively storing the system calling sequences into a system calling sequence set. In some embodiments, a system call sequence corresponding to a preset control request is obtained, one or more system call sequences corresponding to the preset control request are obtained, and the preset control request and the system call sequence corresponding to the preset control request are stored in a set to obtain a preset system call sequence set.
Optionally, after the control instruction is determined to be an illegal intrusion instruction, performing intrusion alarm.
Optionally, the intrusion alarm is performed by triggering an intrusion alarm device to flash lights, buzzes and the like so as to remind the user that the household appliance is illegally intruded.
Optionally, the method further comprises: acquiring a control instruction; and executing the control instruction.
Optionally, after determining that the control request is an illegal control request, the method further includes: acquiring intrusion information, wherein the intrusion information comprises system information of the household appliance and/or a first system calling sequence; upgrading according to the intrusion information; the home device system information includes one or more of home device memory information, home device control program stack, and home device system configuration information.
Optionally, the memory information of the home appliance device is a memory occupation condition of the current home appliance device operating system.
Optionally, the upgrading according to the intrusion information includes: sending the intrusion information to a security server, and triggering the security server to acquire and feed back a security patch package; and installing the security patch package.
Optionally, triggering the security server to obtain the security patch package includes: triggering a security server to match a security patch package corresponding to the intrusion information in a preset security patch package database; the security patch package database stores the corresponding relationship between the intrusion information and the security patch package.
In some embodiments, the system information of the home appliance and the first system call sequence are sent to a security server, an intrusion comparison module in the security server is triggered to match in a preset security patch packet database according to the received system information of the home appliance and the first system call sequence, and a security patch packet corresponding to the system information of the home appliance and/or the first system call sequence is obtained; and receiving a security patch package sent by the security server, and installing and upgrading according to the received security patch package.
Therefore, the first system calling sequence corresponding to the control request is obtained, the first system calling sequence is detected, the invasion information of the household appliance is obtained, the safety patch package is obtained according to the invasion information for installation and upgrading, the invasion detection of the household appliance is realized, the safety defects of the control program of the household appliance are repaired in time, the potential safety hazards of the household appliance are reduced, and the safety of the household appliance is improved.
Referring to fig. 2, a method for intrusion detection of an electrical home device according to an embodiment of the present disclosure includes:
step S201, the home appliance sends a connection request to the service server, and triggers the service server to establish a connection with the home appliance.
Step S202, the service server receives the connection request sent by the household appliance, and feeds back the first connection success information to the household appliance under the condition that the service server establishes connection with the household appliance.
Step S203, the user terminal sends a connection request to the service server, and triggers the service server to establish a connection with the user terminal.
Step S204, the service server receives the connection request sent by the user terminal, and feeds back the second connection success information and the household appliance information to the user terminal under the condition that the service server establishes connection with the user terminal, and triggers the user terminal to send the control request. The home appliance information is a home appliance controllable by a user.
Step S205, the user terminal sends a control request to the service server.
Step S206, the service server receives the control request sent by the user terminal and sends the control request to the household appliance corresponding to the household appliance information; and matching a control instruction corresponding to the control request from a preset control instruction database, and sending the control instruction corresponding to the control request to the household appliance corresponding to the household appliance information.
Step S207, the household appliance receives the control request and the control instruction and executes the control instruction; and sending the information of successful control instruction receiving to the service server.
And step S208, the household appliance equipment acquires a first system calling sequence corresponding to the control request.
Step S209, the intrusion detection module in the home appliance determines whether the first system call sequence is legal.
Step S210, confirming that the control instruction can be successfully executed under the condition that the first system calling sequence is legal; and sending information that the control command can be successfully executed to the service server.
Step S211, the service server sends the information that the control command can be successfully executed to the user terminal.
The system calling sequence corresponding to the control request is obtained through the intrusion detection module and stored in the system calling sequence set, so that the household appliance is more convenient and quicker in intrusion detection, and the accuracy of the intrusion detection of the household appliance is improved.
Referring to fig. 3, a method for intrusion detection of an electrical home device according to an embodiment of the present disclosure includes:
step S301, the home appliance acquires a first system call sequence corresponding to the control request.
Step S302, the intrusion detection module in the home appliance determines whether the first system call sequence corresponding to the control request is legal.
Step S303, in a case that the first system call sequence corresponding to the control request is illegal, determining that the control request is an illegal intrusion instruction.
Step S304, the household appliance obtains intrusion information through an intrusion detection module and carries out intrusion alarm; the intrusion information comprises system information and/or a first system calling sequence of the household appliance; the home device system information includes one or more of home device memory information, home device control program stack, and home device system configuration information.
In step S305, the home appliance transmits the intrusion information to the security server.
Step S306, the security server receives the intrusion information and matches out a security patch package corresponding to the intrusion information from a preset security patch package database according to the intrusion information, wherein the preset security patch package database stores the corresponding relationship between the intrusion information and the security patch package.
In step S307, the security server sends the security patch package to the home appliance.
And step S308, the household appliance receives the security patch package, and installation and upgrade are carried out according to the security patch package.
In some embodiments, when the home appliance receives the control request and the control instruction and controls the home appliance to actually work, the control request and the control instruction are converted into a set of fixed system call sequences, namely a first system call sequence, in the kernel of the operating system of the home appliance; and the control program of the household appliance realizes the control request by calling the first system calling sequence. The intrusion detection module acquires a first system calling sequence corresponding to the control request, compares the first system calling sequence with a second system calling sequence in a system calling sequence set, and determines that the household appliance control program is executing an unknown risk behavior when the first system calling sequence corresponding to the control request is not in the system calling sequence set, and then determines that the control request is an illegal control request, and triggers the household appliance to alarm; meanwhile, invasion information is obtained and sent to the security server, a security patch package in the security server is obtained, and the security patch package is installed for upgrading, so that the security of the equipment is improved.
The method comprises the steps of obtaining a first system calling sequence corresponding to a control request through an intrusion detection module in the household appliance to carry out intrusion detection, obtaining intrusion information, sending the intrusion information to a security server, receiving the intrusion information through an intrusion comparison module by the security server, matching a security patch package corresponding to the intrusion information in a preset security patch package database according to the intrusion information, sending the security patch package to the household appliance through a security updating pushing module, triggering the household appliance to carry out installation and upgrading according to the security patch package, realizing intrusion detection on the household appliance, repairing security defects of a control program of the household appliance, reducing potential safety hazards of the household appliance and improving the security of the household appliance by obtaining the security patch package to carry out installation and upgrading.
Referring to fig. 4, a method for acquiring a system call sequence set according to an embodiment of the present disclosure includes:
step S401, the household appliance sends a connection request to the service server, and the service server is triggered to establish connection with the household appliance.
Step S402, the service server establishes connection with the household appliance, and feeds back the first connection success information to the household appliance.
Step S403, the user terminal sends a connection request to the service server.
Step S404, the service server establishes connection with the user terminal, and feeds back the second connection success information and the household appliance information to the user terminal. The home device information is a user-controllable home device, for example: television, air conditioner, refrigerator.
Step S405, the user terminal sends a control request to the service server.
Step S406, the service server receives the control request, matches a control instruction corresponding to the control request from a preset control instruction database, and sends the control request and the control instruction corresponding to the control request to the home appliance corresponding to the home appliance information.
Step S407, the household appliance receives the control request and the control instruction sent by the service server, and executes the control instruction; and sending the information of successful control instruction receiving to the service server.
Step S408, the home appliance obtains a first system call sequence corresponding to the control request through the intrusion detection module.
Step S409, the home appliance stores the first system call sequence corresponding to the control request in the system sequence call sequence set through the intrusion detection module.
In some embodiments, the user terminal sends a control request D to the service server, the service server receives the control request D and sends a control instruction D corresponding to the control request D to the home appliance device, and the home appliance device obtains a system call sequence corresponding to the control request D and executes the control instruction D. Optionally, the first system call sequence corresponding to the control request D is obtained as a system call sequence o, a system call sequence p, and a system call sequence q, and the system call sequence o, the system call sequence p, and the system call sequence q corresponding to the control request D are stored in a preset system call sequence set; optionally, system call sequences corresponding to all the control instructions are obtained and stored in a preset system call sequence set.
The system calling sequences corresponding to all control requests of the household appliance are obtained through the intrusion detection module and stored in the system calling sequence set, so that the household appliance is more convenient and quicker in intrusion detection, and the accuracy of intrusion detection of the household appliance is improved.
In some embodiments, when the control program of the home device receives a legal control command to control the home device to perform actual work, the control command is converted into one or more system call sequences in the kernel of the operating system of the home device, for example: and when the household appliance executes a legal control instruction a corresponding to the legal control request A, calling a system calling sequence x, a system calling sequence y and a system calling sequence z to realize the legal control request A. When the number of legal control instructions executable by an intelligent household appliance is fixed, namely the number of functions provided by a household appliance control program is fixed, the system calling sequence of the household appliance operating system kernel corresponding to each function is fixed. And obtaining a preset system calling sequence set by obtaining the system calling sequences corresponding to all the functions.
As shown in fig. 5, an apparatus for controlling an electric home appliance according to an embodiment of the present disclosure includes a processor (processor)100 and a memory (memory)101 storing program instructions. Optionally, the apparatus may also include a Communication Interface (Communication Interface)102 and a bus 103. The processor 100, the communication interface 102, and the memory 101 may communicate with each other via a bus 103. The communication interface 102 may be used for information transfer. The processor 100 may call the program instructions in the memory 101 to perform the method for controlling the electric home appliance of the above-described embodiment.
Further, the program instructions in the memory 101 may be implemented in the form of software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 101, which is a computer-readable storage medium, may be used for storing software programs, computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 100 executes functional applications and data processing by executing program instructions/modules stored in the memory 101, that is, implements the method for controlling the home appliance in the above-described embodiments.
The memory 101 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. In addition, the memory 101 may include a high-speed random access memory, and may also include a nonvolatile memory.
According to the device for intrusion detection, the household appliance obtains the system calling sequence corresponding to the control request, and can carry out intrusion detection according to the system calling sequence corresponding to the control request, so that the safety of the household appliance is improved.
The device provided by the embodiment of the disclosure comprises the device applied to the household appliance side and used for intrusion detection; the device is used for acquiring a first system calling sequence corresponding to the control request; and intrusion detection is performed according to the first system call sequence.
The server provided by the embodiment of the present disclosure is a service server, and includes the above-mentioned device for intrusion detection applied to the service server side; the device is used for acquiring a connection request; acquiring the information of the household appliance according to the connection request; sending the household appliance information to a user terminal, and triggering the user terminal to feed back a control request; receiving a control request, and acquiring a control instruction according to the control request; and sending the control instruction and the control request to the household appliance corresponding to the household appliance information, triggering the household appliance to carry out intrusion detection and feeding back intrusion information to the security server.
The server provided by the embodiment of the present disclosure is a security server, and includes the above-mentioned device for intrusion detection applied to the security server side; the device is used for acquiring intrusion information, wherein the intrusion information comprises household appliance system information and/or a first system calling sequence; the household appliance system information comprises one or more of household appliance memory information, a household appliance control program stack and household appliance system configuration information; acquiring a security patch package according to the intrusion information; and sending the security patch package to the household appliance, and triggering the household appliance to upgrade according to the security patch package.
Optionally, the device is an intelligent home appliance with an intrusion detection module and a security update installation module, such as: televisions, refrigerators, air conditioners, and the like.
The equipment provided by the embodiment of the disclosure can carry out intrusion detection according to the system calling sequence corresponding to the control request by acquiring the system calling sequence corresponding to the control request, thereby improving the safety of the household appliance. As shown in fig. 5, an embodiment of the present disclosure provides a system for intrusion detection, including: the system comprises a router 1, a security server 2, household electrical appliances 3, a service server 4, a user terminal 5, an intrusion comparison module 6, a security update push module 7, an intrusion detection module 8 and a security update installation module 9. Optionally, the service server 4 receives a control request sent by the user terminal 5 through the router 1, the service server 4 sends a control instruction corresponding to the control request to the household electrical appliance 3 through the router 1, the household electrical appliance 3 performs intrusion detection on the control instruction through the intrusion detection module 8, when the control instruction is determined to be an illegal intrusion instruction, the intrusion detection module 8 obtains intrusion information and sends the intrusion information to the security server 2 through the router 1, the intrusion comparison module 6 in the security server 2 receives the intrusion information and obtains a security patch package corresponding to the intrusion information, the security update push module 7 sends the security patch package to the household electrical appliance 3 through the router 1, and the security update installation module 9 in the household electrical appliance 3 receives the security patch package and performs installation and upgrade.
The disclosed embodiments provide a computer-readable storage medium having stored thereon computer-executable instructions configured to perform the above-described intrusion detection providing method.
Embodiments of the present disclosure provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the above-described method for intrusion detection.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, where the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other like elements in a process, method or apparatus that comprises the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be merely a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between the different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (10)

1. A method for intrusion detection is applied to a service server side, and is characterized by comprising the following steps:
acquiring a connection request;
acquiring the information of the household appliance according to the connection request;
sending the household appliance information to a user terminal, and triggering a feedback control request of the user terminal;
receiving the control request, sending the control request to the household appliances corresponding to the household appliance information, triggering the household appliances to carry out intrusion detection and feeding back intrusion information to a security server;
the intrusion information comprises household appliance system information and/or a first system calling sequence; the home appliance system information includes one or more of home appliance memory information, a home appliance control program stack, and home appliance system configuration information.
2. The method of claim 1, wherein obtaining the home device information according to the connection request comprises:
connecting with the user terminal according to the connection request;
matching the household appliance information corresponding to the connection request in a preset equipment information table under the condition of successful connection with the user terminal;
the device information table includes a correspondence between the connection request and the home device information.
3. The method of claim 1, wherein triggering the home device for intrusion detection comprises:
and triggering the household appliance to acquire a first system calling sequence according to the control request, and carrying out intrusion detection according to the first system calling sequence.
4. The method of claim 3, wherein performing intrusion detection according to the first sequence of system calls comprises:
and determining the control request as an illegal intrusion request under the condition that the first system calling sequence meets a preset condition.
5. The method of any of claims 1 to 4, further comprising:
acquiring a control instruction according to the control request;
and sending the control instruction to the household appliance, and triggering the household appliance to execute the control instruction.
6. The method of claim 5, wherein obtaining control instructions based on the control request comprises:
matching a control instruction corresponding to the control request from a preset control instruction database according to the control request;
the control instruction database stores the corresponding relation between the control request and the control instruction.
7. A method for intrusion detection, applied to a security server side, includes:
acquiring intrusion information, wherein the intrusion information comprises household appliance system information and/or a first system calling sequence; the household appliance system information comprises one or more of household appliance memory information, a household appliance control program stack and household appliance system configuration information;
acquiring a security patch packet corresponding to the intrusion information according to the intrusion information;
and sending the security patch package to the household appliance equipment, and triggering the household appliance equipment to upgrade according to the security patch package.
8. The method of claim 7, wherein obtaining the security patch package corresponding to the intrusion information according to the intrusion information comprises:
matching a security patch package corresponding to the intrusion information in a preset security patch package database;
and the security patch packet database stores the corresponding relationship between the intrusion information and the security patch packet.
9. An apparatus for intrusion detection comprising a processor and a memory having stored thereon program instructions, wherein the processor is configured to perform a method for intrusion detection as claimed in any one of claims 1 to 6 or 7 to 8 when executing the program instructions.
10. A server, characterized in that it comprises an apparatus for intrusion detection according to claim 9.
CN202010949629.6A 2020-09-10 2020-09-10 Method and device for intrusion detection and server Pending CN112182574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010949629.6A CN112182574A (en) 2020-09-10 2020-09-10 Method and device for intrusion detection and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010949629.6A CN112182574A (en) 2020-09-10 2020-09-10 Method and device for intrusion detection and server

Publications (1)

Publication Number Publication Date
CN112182574A true CN112182574A (en) 2021-01-05

Family

ID=73920477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010949629.6A Pending CN112182574A (en) 2020-09-10 2020-09-10 Method and device for intrusion detection and server

Country Status (1)

Country Link
CN (1) CN112182574A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794645A (en) * 2005-08-24 2006-06-28 上海浦东软件园信息技术有限公司 Invading detection method and system based on procedure action
CN101399675A (en) * 2007-09-25 2009-04-01 海尔集团公司 Radio control device and network household electrical appliance system
US20120174095A1 (en) * 2011-01-04 2012-07-05 International Business Machines Corporation Automatically and securely configuring and updating virtual machines
CN106685775A (en) * 2017-01-13 2017-05-17 北京同余科技有限公司 Self-inspection type invasion prevention method and system for intelligent household electrical appliance
CN107526501A (en) * 2016-06-22 2017-12-29 佛山市顺德区美的电热电器制造有限公司 The control system and mobile terminal of intelligent appliance
CN108229157A (en) * 2017-12-29 2018-06-29 北京潘达互娱科技有限公司 Server attack early warning method and apparatus
CN110737891A (en) * 2018-07-19 2020-01-31 北京京东金融科技控股有限公司 A host intrusion detection method and device
CN111159718A (en) * 2019-12-31 2020-05-15 青岛海尔科技有限公司 Method and device for bug repair and household appliance

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794645A (en) * 2005-08-24 2006-06-28 上海浦东软件园信息技术有限公司 Invading detection method and system based on procedure action
CN101399675A (en) * 2007-09-25 2009-04-01 海尔集团公司 Radio control device and network household electrical appliance system
US20120174095A1 (en) * 2011-01-04 2012-07-05 International Business Machines Corporation Automatically and securely configuring and updating virtual machines
CN107526501A (en) * 2016-06-22 2017-12-29 佛山市顺德区美的电热电器制造有限公司 The control system and mobile terminal of intelligent appliance
CN106685775A (en) * 2017-01-13 2017-05-17 北京同余科技有限公司 Self-inspection type invasion prevention method and system for intelligent household electrical appliance
CN108229157A (en) * 2017-12-29 2018-06-29 北京潘达互娱科技有限公司 Server attack early warning method and apparatus
CN110737891A (en) * 2018-07-19 2020-01-31 北京京东金融科技控股有限公司 A host intrusion detection method and device
CN111159718A (en) * 2019-12-31 2020-05-15 青岛海尔科技有限公司 Method and device for bug repair and household appliance

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘平等: "《计算机网络安全与管理研究》", 31 January 2013, 吉林大学出版社 *
陈路: "《信息系统工程监理与系统安全测评技术实用手册 下卷》", 31 May 2003, 北京电子出版物出版中心 *

Similar Documents

Publication Publication Date Title
CN106156619B (en) Application security protection method and device
EP3800909B1 (en) Remote management method, and device
EP3537329B1 (en) Access control method and system, electronic device, and computer storage medium
EP3328036B1 (en) Identification information generating method, device, and computer readable storage medium
CN110856126B (en) Information reporting and receiving method, terminal equipment and storage medium
CN101258505B (en) Secure software updates
CN105493098B (en) Terminal device, method for protecting terminal device, and terminal management server
CN111338663B (en) System upgrading method, terminal and storage medium
CN104870068A (en) Method and router for access network
CN112202747A (en) Target device binding method and device, storage medium and electronic device
CN104702760A (en) Communication number updating method and device
EP3783861B1 (en) Data downloading and management method and terminal
CN104750523A (en) Information processing method and electronic equipment
CN112099828A (en) Method, device, storage medium, electronic equipment and system for upgrading electronic equipment
CN113341738A (en) Method, device and equipment for controlling household appliance
CN112565251B (en) Access authentication method, device and system for vehicle-mounted application
CN112182574A (en) Method and device for intrusion detection and server
CN105100030B (en) Access control method, system and device
CN107509180B (en) Method for automatically encrypting short message, storage device and mobile terminal
CN112182573A (en) Method, device and equipment for intrusion detection
JP2008118538A (en) Wireless terminal and wireless lan connection method
CN108234399B (en) Interface communication method and terminal
CN107770148B (en) Software deployment method and device
CN113791802B (en) Vehicle upgrading method, device, equipment and storage medium
CN109785129B (en) Data acquisition method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105

RJ01 Rejection of invention patent application after publication