A honeypot host

A honeypot and host technology, applied in the field of honeypot hosts, can solve problems such as time waste and disadvantages

Inactive Publication Date: 2011-10-12
MIMOS BERHAD
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There is also the inconvenience that in the event a honeypot host is compromised, the honeypot administrator needs to remove the host off the network, then make a copy of its hard drive and reinstall everything in a new setup , so that the honeypot host can again use the
Time will be unnecessarily wasted setting up the same honeypot system repeatedly every time the honeypot host is compromised
Also, while the honeypot host is doing the installation, other attacks can happen silently inside the local network
Therefore, when the honeypot host is invaded, if the network administrator misses some unknown attacks, it will cause disadvantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A honeypot host
  • A honeypot host
  • A honeypot host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention relates to a honeypot host 500 . More specifically, the present invention relates to a honeypot host 500 applied in the network 90, in order to distribute the decoy host 80 to unused surrounding network 90 when the current honeypot system 300 has been invaded. Internet Protocol (IP) address 160, and terminate the honeypot system 300 located in the host 500, and generate a new honeypot system 300. Next, the honeypot host 500 will be described according to the preferred embodiment of the present invention and with reference to the attached description and drawings. However, it should be understood that the description of the preferred embodiment of the present invention and accompanying drawings are only for the convenience of discussion of the present invention, and it is foreseeable that various modifications may be made by those skilled in the art without departing from the scope of the claims.

[0031] The honeypot host 500 of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a honeypot host (500) adapted in a network (90). The honeypot host (500) of the present invention is generally comprised of a computer system (10) and a honeypot system (300) incorporated in the computer system (10). The honeypot system (300) generally deploys at least one decoy host 80 to at least one unused Internet Protocol (IP) address (160) around the network (90). The honeypot system (300) is further adapted to be self-replicable. In the event that a honeypot system (300) in the network (90) is compromised, the honeypot system (300) is capable of self-terminating at least a portion of the compromised honeypot system (300) and self-replicating a new honeypot system (300). The honeypot system (300) is also further adapted to detect whether the current honeypot system (300) has been compromised.; The present invention is also related in another aspect to a method for replicating a honeypot system (300) to replace a compromised honeypot system (300).

Description

technical field [0001] The invention relates to a honeypot host for network. Background technique [0002] For common computer technologies, honeypot systems have been developed for network security. The honeypot system is basically the most secure defense mechanism in the network to detect and prevent network attacks. [0003] There are also honeypot systems that facilitate the generation of decoy hosts around unused Internet Protocol (IP) addresses. Decoy hosts pretend to be real computers in the network, but in reality, decoy hosts are counterfeit schemes, and they tend to replace other operating hosts to attract attackers to invade these decoy hosts. These honeypot systems imitating decoy hosts are installed in computer hardware, which runs on the operating system. [0004] figure 1 The traditional honeypot host mentioned above is shown in . Such as figure 1 As shown, the honeypot host has certain restrictions, that is, it can only run on a single machine configura...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F13/00G06F15/16G06F9/22
CPCH04L63/1441H04L63/1491G06F9/45545G06F9/45558G06F2009/45562
Inventor 扎诺尔阿米·安西里·扎卡里亚·维拉罗哈伊达·艾哈迈德·西蒂艾哈迈德·阿尼亚提阿卜杜勒·穆塔利布·阿卜杜勒·穆扎伊尔阿卜杜勒·阿齐兹·诺拉扎
Owner MIMOS BERHAD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products