Search

CN-122001646-A - Industrial Internet security supervision system and method based on edge computing

CN122001646ACN 122001646 ACN122001646 ACN 122001646ACN-122001646-A

Abstract

The invention discloses an industrial Internet security supervision system and method based on edge calculation, and relates to the technical field of data transmission monitoring. The invention sets a data interaction space in the industrial Internet, wherein the data interaction space consists of a core data space, a transmission link space and an edge virtual space, the transmission link space acquires a data interaction request from the core data space or the edge virtual space, establishes a bidirectional data link according to the data interaction request, further carries out butt joint on the bidirectional data link, acquires an abnormality monitoring report of each bidirectional data link in the data interaction space in real time, sets an abnormality judgment index, judges whether the abnormality monitoring report is abnormal or not according to the abnormality judgment index, and dynamically schedules the composition of the bidirectional data link according to a judgment result.

Inventors

  • ZHAO JIANYI
  • ZHAO JIANBIN

Assignees

  • 深圳市广联智通科技有限公司

Dates

Publication Date
20260508
Application Date
20260202

Claims (9)

  1. 1. An industrial internet security supervision method based on edge calculation is characterized by comprising the following steps: step S1, setting a data interaction space in an industrial Internet, wherein the data interaction space consists of a core data space, a transmission link space and an edge virtual space; S2, a transmission link space acquires a data interaction request from a core data space or an edge virtual space, and establishes a bidirectional data link according to the data interaction request, so as to butt-joint the bidirectional data link; And S3, acquiring the abnormal monitoring report of each bidirectional data link in the data interaction space in real time, setting an abnormal judgment index, judging whether the abnormal monitoring report is abnormal or not according to the abnormal judgment index, and dynamically scheduling the components of the bidirectional data links according to the judgment result.
  2. 2. The method for industrial internet security supervision based on edge computing according to claim 1, wherein the process of setting the data interaction space in the industrial internet comprises: Dividing supervision resources in the industrial Internet into an attack detection resource pool, an encryption communication resource pool, a positioning backtracking resource pool and a collaborative upgrading resource pool according to function types; and setting an independent data interaction space for each resource pool, wherein the data interaction space consists of a core virtual space, a carrying virtual space and an edge virtual space.
  3. 3. An industrial internet security supervision method based on edge computing according to claim 2, wherein the data interaction space comprises: the core virtual space stores all data of a corresponding resource pool: The edge virtual space is provided with a plurality of data mapping modules which run in parallel and are used for performing supervision operation on industrial equipment according to supervision resources from the core virtual space; the carrying virtual space is internally provided with a plurality of data carrying nodes, and the carriers corresponding to the data carrying nodes are edge computing nodes; According to the service coverage range and calculation power requirements of each resource pool, configuring a plurality of resource points in a core virtual space, wherein each resource point corresponds to a core distribution node of one resource pool, and the resource points are connected with the corresponding resource pools through encryption special lines; Setting a plurality of type labels for each edge computing node, wherein the type labels comprise a node identity type label, an algorithm level type label, a supervision range type label and a security level type label, and connecting the plurality of type labels of the same edge computing node in series according to the logic sequence of identity-algorithm-supervision range-security level to obtain the identity map of each edge computing node.
  4. 4. A method of industrial internet security supervision based on edge computing according to claim 3, wherein the process of the transmission link space obtaining the data interaction request from the core data space or the edge virtual space comprises: a request receiving gateway is arranged in the transmission link space, data interaction requests from a core data space or an edge virtual space are captured in real time, after the transmission link space receives the data interaction requests, request core information is extracted from the data interaction requests, and an identity verification mechanism is synchronously started in the process of extracting the request core information.
  5. 5. The method for industrial internet security supervision based on edge computing according to claim 4, wherein the process of establishing a bidirectional data link by the transmission link space according to the data interaction request comprises: According to the request core information, the transmission link space calls a link planning principle, wherein the link planning principle comprises data security level matching link level, real-time demand matching link bandwidth and resource position matching link length, and then a bidirectional data link is established for the core data space and the edge virtual space according to the link planning principle: According to the data security level, the bidirectional data link is divided into a core link and a common link, wherein the core link preferably selects an edge computing node with sufficient computing power and high security level as a data carrying node, so that the stability of core data transmission is ensured, and when the core link is selected, the common link is formed according to the rest edge computing nodes as the data carrying nodes; Dividing a core link and a common link into an uplink and a downlink, modifying the number of data carrying nodes according to the volume of data, and finally ensuring that part of the data carrying nodes can be accessed into a plurality of links when planning the links according to the principles of computational redundancy and load balancing; And simultaneously, the downlink starts from the resource point of the corresponding resource pool, the planned data carrying node is finally abutted against the corresponding data mapping module, and the uplink starts from the data mapping module and is converged to the target resource pool of the core data space through the cross node.
  6. 6. The method for industrial internet security supervision based on edge computing according to claim 5, wherein the process of interfacing the bidirectional data link comprises: when the data carrying nodes of the bidirectional data link are determined, the resource points in the core data space call the corresponding resource points for connection according to the request core information, and a corresponding interactive data range link is generated; The transmission link space builds a bidirectional data link through a distributed routing protocol, a connection is built between an interactive data range link or a data mapping module and a first carrying node, the first carrying node and a next edge computing node are connected through the distributed routing protocol through encryption of special line transmission link configuration parameters, the configuration parameters are synchronously configured, the serial connection of all nodes is sequentially completed, a complete uplink/downlink link is formed, and the bidirectional data link is in butt joint with the bidirectional data link currently existing in the transmission link space after the bidirectional data link is built; the butt joint process comprises a physical butt joint and an encryption verification dual process, wherein two ends of a bidirectional data link are adapted to communication interfaces of a first or last data carrying node of the link, so that the self-adaptive conversion of various industrial communication protocols is supported, and the smooth butt joint of equipment with different interface types is ensured; the method comprises the steps that a core data space generates a complete encryption key and is split into a plurality of feature codes, each carrying node is distributed with 1 feature code, nodes at two ends of a bidirectional data link respectively reserve 1 feature code, before data interaction is carried out between the core virtual space and an edge virtual space, the nodes at two ends of the bidirectional data link complete encryption key reconstruction through feature code splicing and encrypt transmission data through the complete encryption key, each carrying node is only responsible for transmitting data fragments carrying self feature code marks, complete data and keys cannot be obtained, and the data carrying nodes at two ends verify the legality of the feature codes of the other sides during butt joint.
  7. 7. The industrial internet security supervision method based on edge computing according to claim 6, wherein the real-time acquisition of anomaly monitoring reports of each bidirectional data link in the data interaction space comprises the following specific processes: Setting a hierarchical monitoring mechanism for the data interaction space, wherein the hierarchical monitoring mechanism comprises a node level, a link level and a global level; The node level monitoring is used for monitoring the real-time state of each data carrying node, including the computational load, the network bandwidth occupation, the data transmission rate, the self-safety state and the connection state with the adjacent data carrying nodes; The link level monitors an interaction track for the whole bidirectional data link, including a data transmission path, a transmission delay, the integrity of a feature code and the continuity of data interaction; The global level is used for monitoring the load balancing condition of the cross nodes of a plurality of bidirectional data links, judging whether the problems of link congestion and resource waste exist or not, and simultaneously, correlating the latest attack feature library of the attack detection resource pool to monitor whether malicious attacks aiming at the links exist or not; Setting monitoring frequencies for the bidirectional data links, collecting the data transmission condition of each bidirectional data link in the data interaction space through a hierarchical monitoring mechanism, and outputting an abnormal monitoring report when each monitoring frequency is finished.
  8. 8. The method for industrial internet security supervision based on edge computing according to claim 7, wherein setting an anomaly determination index, determining whether an anomaly monitoring report is abnormal by the anomaly determination index, and dynamically scheduling the composition of the bidirectional data link according to the determination result comprises: setting an abnormal judgment index, comparing the monitoring results of each level in the abnormal monitoring report with each abnormal judgment index, and judging that the execution of the data interaction task is normal under the current monitoring frequency if each index of the abnormal monitoring report is judged to pass; If any index of the abnormal monitoring report is judged to be failed, the abnormal monitoring report is judged to locate the corresponding data carrying node, and then the corresponding data carrying node is dynamically adjusted.
  9. 9. An industrial internet security supervision system based on edge calculation, which is used for realizing the industrial internet security supervision method based on edge calculation as set forth in any one of claims 1-8, and is characterized by comprising a resource management and control module and a transmission detection module; The resource management and control module is used for setting a data interaction space in the industrial Internet, wherein the data interaction space consists of a core data space, a transmission link space and an edge virtual space, and further the transmission link space acquires a data interaction request from the core data space or the edge virtual space, establishes a bidirectional data link according to the data interaction request and carries out butt joint on the bidirectional data link; The transmission detection module is used for collecting the abnormal monitoring reports of all the bidirectional data links in the data interaction space in real time, setting an abnormal judgment index, judging whether the abnormal monitoring reports are abnormal or not according to the abnormal judgment index, and dynamically scheduling the components of the bidirectional data links according to the judgment result.

Description

Industrial Internet security supervision system and method based on edge computing Technical Field The invention relates to the technical field of data transmission monitoring, in particular to an industrial Internet security supervision system and method based on edge computing. Background In the current digital age, the rapid development of the industrial Internet greatly improves the intelligent and automatic level of industrial production. However, with the increasing mass growth and frequent interaction of data in the industrial internet, the security problem is also becoming more and more prominent, and becomes a key factor for restricting the further development of the industrial internet. The traditional industrial internet security supervision method is mainly focused on centralized management under a cloud computing architecture, and data processing and analysis mainly depend on a remote data center. However, this approach has certain drawbacks, such as high data transmission delay, difficulty in meeting industrial production scenarios with high real-time requirements, and single-point failure risk of the centralized architecture, which may cause paralysis of the whole industrial internet system once the data center has a problem. Meanwhile, in a complex industrial network environment, a large number of data interaction requests with unknown sources exist, and if an effective supervision means is lacked, network attacks such as data leakage and malicious invasion are easily suffered, so that huge losses are brought to industrial production. Therefore, a more efficient and reliable safety supervision method is urgently needed to ensure the stable operation of the industrial internet. In order to solve the problems, the invention provides an industrial Internet security supervision method based on edge calculation, which is used for carrying out fine management on data interaction by setting a data interaction space in an industrial Internet so as to accurately monitor and process the security problems in the industrial Internet in real time. Disclosure of Invention The invention aims to provide an industrial Internet security supervision system and method based on edge calculation, which are used for solving the problem of the deficiency in the background technology. In order to achieve the above object, the present invention provides the following technical solutions: an industrial internet security supervision method based on edge calculation comprises the following steps: step S1, setting a data interaction space in an industrial Internet, wherein the data interaction space consists of a core data space, a transmission link space and an edge virtual space; S2, a transmission link space acquires a data interaction request from a core data space or an edge virtual space, and establishes a bidirectional data link according to the data interaction request, so as to butt-joint the bidirectional data link; And S3, acquiring the abnormal monitoring report of each bidirectional data link in the data interaction space in real time, setting an abnormal judgment index, judging whether the abnormal monitoring report is abnormal or not according to the abnormal judgment index, and dynamically scheduling the components of the bidirectional data links according to the judgment result. Further, the process of setting the data interaction space in the industrial internet comprises the following steps: Dividing supervision resources in the industrial Internet into an attack detection resource pool, an encryption communication resource pool, a positioning backtracking resource pool and a collaborative upgrading resource pool according to function types; and setting an independent data interaction space for each resource pool, wherein the data interaction space consists of a core virtual space, a carrying virtual space and an edge virtual space. Further, the data interaction space includes: the core virtual space stores all data of a corresponding resource pool: The edge virtual space is provided with a plurality of data mapping modules which run in parallel and are used for performing supervision operation on industrial equipment according to supervision resources from the core virtual space; The data carrying nodes are connected with each other according to a distributed routing protocol from the edge virtual space or the core virtual space to form a bidirectional data link; According to the service coverage range and calculation power requirements of each resource pool, configuring a plurality of resource points in a core virtual space, wherein each resource point corresponds to a core distribution node of one resource pool, and the resource points are connected with the corresponding resource pools through encryption special lines; When the core virtual space receives a data interaction request, calling resource points to connect according to the data interaction request, and generating a corresponding interact