Active network defense method and system

A technology of active network and defense system, applied in transmission systems, digital transmission systems, electrical components, etc.

Inactive Publication Date: 2009-07-01
AEROSPACE INFORMATION
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under normal circumstances, no business applications are deployed on the honeypot, so the communication in and out of the honeypot is unauthorized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active network defense method and system
  • Active network defense method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0028] see figure 1 As shown, it is a flowchart of the active network defense method of the present invention, and the steps it includes are:

[0029] Step a: Virtually set up at least one server or router with obvious security holes in the network;

[0030] Step b: the network attacker obtains the administrator command interpretation program of the server or router by utilizing the vulnerability;

[0031] Step c: monitor the command interpretation program run by the network attacker, and record the running process for evidence collection.

[0032] Wherein, the at least one server or router with obvious security loopholes set virtually in the network is the honeypot, and its most fundamental feature is a virtual service with loopholes intentionally left. These services are set up on a certain system. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an active network defense method and a system. The method for realization comprises the steps as follows: in step a, at least a server or a router with obvious security vulnerabilities is set in a network in a virtual manner; in step b, a network attacker obtains an administrator command interpreter of the server or the router by utilizing the vulnerabilities; and in step c, the command interpreter runs on the network attacker for monitoring, and the running process is recorded for obtaining evidence.

Description

technical field [0001] The present invention relates to a computer network security technology, in particular to a method of setting up a virtual machine in the network, inducing a hacker to scan and attack the virtual machine, correspondingly recording information such as the hacker's whereabouts and attack methods, and confusing Cyber ​​defense methods and systems for hackers. Background technique [0002] In computer network, firewall, intrusion detection and vulnerability scanning are the basic means to protect network security. The firewall is installed on the periphery of the protected network to defend against external attacks, and the intrusion detection system is installed inside the protected network to defend against attacks from within the network. However, these technologies are all passive defenses, and only when hackers launch an attack, will they respond. Therefore, in order to effectively defend, it is necessary to understand some information about hackers....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L9/10
Inventor 丁瑶张庆胜王磊程登峰净媛媛
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products