Method and system for updating and restoring honeypot database

A database and honeypot technology, applied in the field of information security, can solve problems such as long switching time, slow data import and export speed, and affecting the authenticity of the honeypot database

Active Publication Date: 2018-05-08
HARBIN ANTIY TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that the switching time is long, the data import and export speed is slow, and the opportunity of being invaded may be missed
[0007] The biggest problem with the above existing technologies is that the attacker is likely to observe whether there is incremental data imported during the intrusion process, and will also modify the database content at the same time, but the above two solutions do not affect the security of the snapshot content. , cannot complete the supplement of incremental data in the process of being attacked, which will affect the authenticity of the honeypot database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating and restoring honeypot database
  • Method and system for updating and restoring honeypot database
  • Method and system for updating and restoring honeypot database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention provides a method and system for updating and restoring a honeypot database, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to enable the above-mentioned purposes, features and advantages of the present invention to It is more obvious and easy to understand, and the technical solution in the present invention will be described in further detail below in conjunction with the accompanying drawings:

[0034] The present invention firstly provides an embodiment of a method for updating and restoring a honeypot database, including an initialization phase and a putting into use phase. The initialization phase is as follows: figure 1 shown, including:

[0035] S101 fills the real business data into the honeypot database after processing, and sets the honeypot database as low authority;

[0036] S102 copying the metadata in the honeypot database and the processed re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for updating and restoring a honeypot database. Firstly, real business data is processed and filled into the honeypot database, and the honeypot database is set as low authority; elements in the honeypot database are copied The data and the processed real business data form a backup database, and the backup database is set as a high authority; the honeypot database is opened to the outside world; the incremental data of the real business data is processed and updated to the honeypot database and the backup database at the same time; If a restoration request is received, the original honeypot database is deleted, and the backup database is copied to form a new honeypot database. The technical scheme of the invention not only solves the problem that data changes caused by the intrusion of the honeypot database and thus affects subsequent use, but also can complete the import of incremental data during the intrusion process of the attacker, making the honeypot database more authentic and credible.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for updating and restoring a honeypot database. Background technique [0002] With the current evolution of honeypot technology, due to the lack of rich data, hackers can tell whether the target is a honeypot after only a preliminary intrusion and give up subsequent attacks. At this time, even if the source of the attack is captured and the person is located, but Due to the small number of operations, you can evade company regulations and legal sanctions for reasons such as "unintentional viewing", "input errors", and "safety inspections". [0003] In the evolution of database-oriented application-level honeypot technology, especially for the simulation implementation of business systems, a large amount of data is also added to it, which helps to analyze the attacker's intrusion process and purpose in more detail, and the attacker will have no rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F11/14
Inventor 王维肖新光
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products