Implementation method and device of application-type honeypot

An implementation method and honeypot technology, applied in the field of computer security, can solve the problems that are easily perceived as honeypots, services and data are too simple, and achieve the effect of ensuring credibility

Inactive Publication Date: 2015-10-14
HARBIN ANTIY TECH
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the above problems, the present invention provides a method and device for implementing an application-type honeypot. By using processed real application services and real data, the service and data in the existing honeypot technology are too simple to be perceived as Honeypot problems, while ensuring the activity of data in the honeypot, to achieve the purpose of attracting attackers or malicious code to run in the honeypot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device of application-type honeypot
  • Implementation method and device of application-type honeypot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0031] The present invention provides a method and device for implementing an application-type honeypot. By using processed real application services and real data, it solves the problem that the service and data in the existing honeypot technology are too simple and are easily perceived as honeypots. , while ensuring the activity of the data in the honeypot, achieving the purpose of attracting attackers or malicious codes to run in the honeypot.

[0032] An application-type honeypot implementation method, such as figure 1 shown, including:

[0033] S101: Obtain the applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an implementation method and device of an application-type honeypot. The implementation method comprises the following steps: obtaining application service to be simulated and the attribute information and the application environment of the application service to be simulated, and deploying the same application service and application environment into the honeypot; setting the corresponding attributes of the honeypot, for example, a login account of the application service of the honeypot is set to be the same with the application service to be simulated, and the known controllable security holes of at least one application service is opened; according to a user flag, carrying out decryption processing on all pieces of business data in the application service, applying a confounding algorithm to carry out deformation processing on all pieces of business data, and then, importing the business data into the application service of the honeypot; and importing newly-added business data into the application service of the honeypot in fixed time or real time. The invention also provides corresponding equipment. The application-type honeypot can be combined with the real business data of the user to confuse an attacker to a maximum degree, and the attacker is enabled to think that the honeypot is the real application service data of the user.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method and device for realizing an application-type honeypot. Background technique [0002] Honeypot technology is a kind of host and service that pretends to be useful and has BUG or flaws to attract attackers or malicious codes to invade, so as to analyze the behavior motives and technical details of the attackers or malicious codes for research and defense etc. [0003] At present, honeypot technology in the network security industry is generally divided into two types: low-interaction honeypot and high-interaction honeypot. Low-interaction honeypots generally use low-level simulation technology to achieve very elementary interactions, and the captured network behavior is also very limited. Typical representatives For HoneyD, Nepenthes, Dionaea; high-interaction honeypots generally use full-featured services or modified disguised services, and install agents or traffic anal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
Inventor 王维李柏松
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products