Spurious response system and method based on dynamic variation and network security system and method

A dynamically changing and false technology, applied in the field of network security, can solve the problems of poor practicability and versatility, many modules involved, complex deployment, etc., to achieve the effect of defending against penetration attacks, widely promoting application value, and maintaining security and stability

Active Publication Date: 2016-06-29
北京卫达信息技术有限公司
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To a certain extent, the system can provide legality management and behavior audit of intranet resources, and prevent internal attacks and unauthorized access behaviors. However, due to the large number of modules involved and complex deployment, its practicability and versatility are poor.
[0007] In general, the existing detection methods for network penetration attacks cannot achieve good results in practical applications. definite

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Spurious response system and method based on dynamic variation and network security system and method
  • Spurious response system and method based on dynamic variation and network security system and method
  • Spurious response system and method based on dynamic variation and network security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0065] The difference between the false response system and security system described in the second preferred embodiment of the present invention and the above-mentioned first preferred embodiment is only that the false response information generation unit 13 further includes a vulnerability information generation module 25, as shown in the attached Figure 6 As shown, the user configuration information therein also correspondingly includes some system vulnerability information that can perform false responses and the probability of performing false responses for each piece of vulnerability information, and the vulnerability information generation module 25 can perform false responses according to the user configuration information. Some system vulnerability information and the probability that each piece of vulnerability information performs a false response, for each IP address generated by the response IP generation module 21 randomly generates corresponding several vulnerabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a spurious response system and method based on dynamic variation and a network security system and method.The spurious response system comprises a spurious response information configuration unit and a spurious response unit, the spurious response information configuration unit configures spurious response information which can be varied dynamically and comprises a spurious IP address and a spurious MAC address at a minimum according to user configuration information, and the spurious response unit constructs a spurious response data packet and conducts spurious response on suspected scanning detection data packets according to the spurious response information.According to the spurious response system and method, spurious response is conducted on scanning detection behaviors of attackers, spurious response can be varied dynamically according to configuration, thereby the attackers cannot obtain the topological structure of a network and cannot accurately obtain real information of hosts in the network, in this way, network penetration attacking behaviors are effectively defended, and safety and stability of the network are maintained.

Description

technical field [0001] The invention relates to the field of network security, in particular to a dynamic transformation-based false response system, a false response method, a network security system and a network security defense method based thereon. Background technique [0002] With the rapid development of computer networks and information technology, the process of global informatization continues to accelerate, and the network plays an increasingly important role in today's society, becoming a national strategic resource covering important fields such as government, commerce, finance, and communications. At the same time, network security threats are also emerging in an endless stream. Attackers enter the network system through technical means or social engineering methods to carry out information theft, system destruction, malicious deception and other activities, which not only affect the work and life of ordinary people, but also become threats. Major issues of ec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 耿童童
Owner 北京卫达信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products