摘要:
Systems, methods, and apparatus for network intrusion detection are provided. A device configured to facilitate network intrusion detection may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions. The at least one processor may be configured to access the at least one memory and execute the computer-executable instructions to (i) identify a communication, the communication comprising one of (a) a communication received by the device or (b) a communication generated by the device; (ii) identify a type associated with the communication; (iii) determine, based at least in part upon the identified type, a list of acceptable content for the communication; (iv) analyze, based at least in part upon the determined list, the content of the communication; and (v) determine, based at least in part upon the analysis, whether the content is acceptable content.
摘要:
Systems, methods, and apparatus for network intrusion detection are provided. A device configured to facilitate network intrusion detection may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions. The at least one processor may be configured to access the at least one memory and execute the computer-executable instructions to (i) identify a communication, the communication comprising one of (a) a communication received by the device or (b) a communication generated by the device; (ii) identify a type associated with the communication; (iii) determine, based at least in part upon the identified type, a list of acceptable content for the communication; (iv) analyze, based at least in part upon the determined list, the content of the communication; and (v) determine, based at least in part upon the analysis, whether the content is acceptable content.
摘要:
Systems, methods, and apparatus for network intrusion detection are provided. A device may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions that facilitate traffic inspection of communications received by the device. The at least one processor may be configured to access the at least one memory and execute the computer-executable instructions to (i) identify a communications interface associated with at least one received communication; (ii) determine one or more network traffic parameters associated with a network traffic profile for the communications interface; (iii) evaluate, based at least in part upon the one or more network traffic parameters, the at least one communication received by the device; and (iv) determine, based at least in part upon the evaluation, whether the at least one communication satisfies the traffic profile.
摘要:
Systems, methods, and apparatus for network intrusion detection are provided. A device configured to facilitate intrusion detection may include at least one memory and at least one processor. The at least one memory may be configured to store an application that facilitates inspection of communications received by or transmitted by the device. The at least one processor may be configured to access the at least one memory and execute the application to (i) identify a device type associated with the device; (ii) determine, based at least in part upon the identified device type, a list of acceptable content; (iii) analyze, based at least in part upon the determined list, the content of a communication associated with the device; and (iv) determine, based at least in part upon the analysis, whether the content is acceptable content.
摘要:
Systems, methods, and apparatus for network intrusion detection are provided. A device may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions that facilitate traffic inspection of communications received by the device. The at least one processor may be configured to access the at least one memory and execute the computer-executable instructions to (i) identify one or more network traffic parameters associated with a network traffic profile for the device; (ii) evaluate, based at least in part upon the one or more network traffic parameters, at least one communication received by the device; and (iii) determine, based at least in part upon the evaluation, whether the at least one communication satisfies the traffic profile.
摘要:
Systems, methods, and apparatus for identifying, invalid nodes within a mesh network are provided. A routing table may be maintained by a utility meter. The routing table may include information associated with one or more devices in communication with the utility meter via a mesh network. A change in the routing table may be identified by the utility meter, and an alert message associated with the identified change may be generated by the utility meter. The generated alert may then be output by the utility meter for communication to a central controller configured to process the alert message to identify an invalid node within the mesh network.
摘要:
Systems, methods, and apparatus for facilitating utility meter communication are provided. One or more communications to be transmitted by a utility meter may be identified by the utility meter. A cost associated with the transmission of the one or more communications may be determined by the utility meter, and a determination may be made as to whether the cost satisfies one or more cost parameters. If it is determined that the cost satisfies the one or more cost parameters, the one or more communications may be transmitted by the utility meter. If, however, it is determined that the cost does not satisfy the one or more cost parameters, the one or more communications may be stored by the utility meter for subsequent transmission.
摘要:
A system for monitoring operation of an electric vehicle charging station is provided. The system includes a battery charger configured to couple to a device for supplying current to the device, a current sensor coupled to the battery charger for measuring current supplied from the battery charger to the device, the current sensor configured to generate a measured current profile based on the measured current supplied to the device, and a processor coupled to the current sensor. The processor is configured to receive the measured current profile transmitted from the current sensor, and compare the measured current profile to at least one known current profile to monitor operation of the charging station.
摘要:
Systems, methods, and apparatuses for reducing network congestion in a smart utility meter system are provided. The systems, methods, and apparatuses may include providing, for a utility meter, a first communications interface for communicating with a first network; providing, for the utility meter, a second communications interface for communicating with a second network different from the first network; receiving or generating, by the utility meter, information having a destination; selecting either the first communications interface or the second communications interface; and delivering the information to the destination via the selected communications interface.
摘要:
Systems, methods, and apparatus for identifying, invalid nodes within a mesh network are provided. A routing table may he maintained by a utility meter. The routing table may include information associated with one or more devices in communication with the utility meter via a mesh network. A change in the routing table may be identified by the utility meter, and an alert message associated with the identified change may be generated by the utility meter. The generated alert may then be output by the utility meter for communication to a central controller configured to process the alert message to identify an invalid node within the mesh network.