Network trapping method based on honey pot

A network and honeypot technology, applied in the field of honeypot-based network trapping and network trapping, can solve problems such as false alarms, user troubles, failure to provide protection, etc., and achieve reasonable design effects

Inactive Publication Date: 2017-07-18
CHINA ELECTRONICS STANDARDIZATION INST +1
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional information security technology mainly focuses on blocking and detection for attack prevention, such as firewall and IDS, but these two technologies have their limitations. The firewall controls access based on fix

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network trapping method based on honey pot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] see figure 1 , a honeypot-based network trapping method, including

[0025] The external firewall, as the first line of defense of the network, protects the servers that provide web services;

[0026] Internal firewall, set the information control function of "wide entry and strict exit";

[0027] Network phishing system, containing various forged files and information, simulating real network resources to attract attackers to attack and invade honeyp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a honeypot-based network trapping method, which comprises an outer firewall, an inner firewall and a network deception system. The beneficial effects of the invention are: the "wide entry" of the internal firewall is to confuse the intruder and let him "make the best use of it", while the "strict exit" ensures that the intruder's activities are limited to the "cage", and more data can be collected , evidence, and also prevent intruders from using the system as a springboard to conduct further attacks on other systems. Organizing information to deceive forged persons and locations also requires forged information such as salary, budget, and personal records. The more real the forged information is , the more you can avoid deception, and it is easy to be discovered. Network traffic simulation replicates all access connections, making the deception system very similar to the real system. Service camouflage writes a series of scripts in the system to simulate the characteristics of some application services, providing seemingly Normal service, leading the attacker to believe that the trapping system is a functioning system.

Description

technical field [0001] The invention relates to a network trapping method, in particular to a honeypot-based network trapping method, belonging to the technical field of network security. Background technique [0002] A honeypot is a security resource whose value lies in being detected, attacked or compromised. Honeypot technology is a decoy technology that lures intruders through false resources to collect hacker attack data and analyze hacker attack behaviors to achieve the goal of protecting real hosts. This means that the honeypot is a pre-configured system, which may contain certain loopholes, or contain various forged documents and information to deceive hackers into attacking and invading the honeypot. [0003] The significance of the existence of the honeypot system is to be detected and attacked. Any interaction with the honeypot can be considered as an attack. Therefore, through the monitoring of the honeypot, the behavior of the attacker can be discovered, analyz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1491
Inventor 范科峰龚亮华姚相振魏钦志高魏轩李琳周睿康
Owner CHINA ELECTRONICS STANDARDIZATION INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products