Method and an apparatus for realizing network traceless honeypot

A technology of a traceless honeypot and an implementation method, applied in the field of information security, can solve problems such as being easily perceived as a honeypot, and achieve the effect of being easily confused and ensuring concealment

Inactive Publication Date: 2017-12-12
广州锦行网络科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the above problems, the present invention provides a method and device for implementing a network traceless honeypot, which transmits data with the outside of the honeypot in a way that does not generate network traffic in the honeypot, and solves the problem of the existing honeypot technology passing through the network. Data transmission is easily perceived as a honeypot problem, while ensuring the concealment of the monitoring module in the honeypot, which can prevent the attacker from finding himself in the honeypot by monitoring network traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and an apparatus for realizing network traceless honeypot
  • Method and an apparatus for realizing network traceless honeypot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0030] The present invention provides a method and device for implementing a network traceless honeypot. Through the virtualization technology, two-way data transmission between the outside of the honeypot and the inside of the honeypot is realized. During the process of data transmission, no data is generated inside the honeypot. Network traffic solves the problem in the existing honeypot technology that attackers can easily find out that they are in the honeypot by detecting network traffic, enhances the concealment of the honeypot, and achieves the effect of being traceless...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and apparatus for realizing a network traceless honeypot. The method comprises the following steps: a honeypot environment is set up by use of a virtualization technology, through a control mode provided by the virtualization technology, a honeypot external control module actively initiates data transmission with a honeypot internal monitoring module, such a mode does not generate network flows in the honeypot environment, and the network location of a honeypot external control program cannot be obtained at all in a honeypot. The invention also brings forward a corresponding apparatus. Through the network traceless honeypot, network behavior of uploading data in the honeypot can be hidden completely, an attacker is quite confused, and thus the purpose of more effectively luring the attacker is realized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for realizing a network traceless honeypot. Background technique [0002] Honeypot technology generally pretends to be a network service with loopholes. Its value lies in being compromised or exploited, and can respond to attacks. It can be used to deceive attackers, attract attackers or malicious codes to invade, increase its attack cost, and Monitor, record and analyze attack behaviors, predict attack intentions, and achieve targeted defense. [0003] Honeypots are generally divided into low-interaction honeypots and high-interaction honeypots. Low-interaction honeypots generally use simulated services, which can only perform primary interactions, and the data that can be recorded and analyzed is limited. High-interaction honeypots can generally provide close to The real environment can record in-depth and diversified attack data, so as to carr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441H04L63/1491
Inventor 胡鹏吴建亮王俊卿
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products