Extension defense method based on network intrusion

A network intrusion and network technology, applied in the field of extended defense based on network intrusion, can solve the problem that the intruder's behavior, motivation, method and source cannot be fully obtained, and achieve the effect of delaying the intrusion time.

Inactive Publication Date: 2014-11-12
WUHAN ANWEN SCI & TECH DEV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide an extended defense method for network intruders, to overcome the inability of the existing technology to fully obtain the intrude

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extension defense method based on network intrusion
  • Extension defense method based on network intrusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The specific implementation of the present invention can be realized in multiple ways, combining figure 1 with figure 2 As shown, those skilled in the art can complete the deployment and implementation of the method through the following steps:

[0021] 1. Establish a decoy network, and deploy decoy network node device A, decoy network node device B or possible decoy network node devices...;

[0022] 2. In response to various intrusion behaviors taken by intruders, the trapping network and its decoy network node equipment have the defect of being invaded and attacked. The methods include but are not limited to:

[0023] Make the decoy network, decoy network node equipment A, B or possible decoy network node equipment... have one or several obvious network vulnerabilities, system vulnerabilities, software vulnerabilities, improper application configuration, false sensitive information or weak / no password ;

[0024] 3. According to the actual situation of the intruder...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security and discloses an extension defense method based on network intrusion. According to actual situations of intrusion behaviors of intruders, intentions and purposes of the intruders are analyzed and judged by building a trap network, related trap network node devices constituting the trap network are disconnected or connected or added or removed in real time, therefore, targets to which the intruders pay attention are changed, the intrusion priorities are changed, bait resource deployment and configuration are changed, objects intruding and percolating into the network are controlled, and delaying, monitoring, tracking, analyzing, source tracing and evidence obtaining are conducted on intrusion processes of the intruders. According to the method, an existing network can be built or deployed completely, the active defense capability of the network can be further enhanced, and the method is a novel, deep and multi-dimensional network defense strategy.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an extended defense method based on network intrusion. Background technique [0002] With the rapid development of network technology, network security issues are becoming more and more serious. The frequent occurrence of various types of network intrusion and penetration incidents not only brings great harm to users, but also promotes the development of today's network defense technology. Traditional passive network defense technologies, such as firewalls and vulnerability scanning tools, are increasingly unable to meet today's network protection requirements. On the other hand, the processing flow of traditional network defense methods can only obtain the most general performance characteristics for the discovery of certain attacks and infiltrations, and the intruder's behavior, motivation, method, source and other in-depth attack processes are often insuffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26G06F21/56G06F21/55
Inventor 温杰李牧高谞舒文静
Owner WUHAN ANWEN SCI & TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products