Network defense method and system based on honey pot technology

A defense system and network technology, applied in transmission systems, electrical components, etc., can solve the problems of not being able to simulate the real customer scene, no network isolation, occupying storage space, etc. The effect of delaying the attack

Inactive Publication Date: 2018-02-16
SANGFOR TECH INC
View PDF6 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing honeypots cannot simulate the real scene of the customer, which takes up a lot of storage space, and there is no network isolation between many similar honeypots, which will interfere with each other

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network defense method and system based on honey pot technology
  • Network defense method and system based on honey pot technology
  • Network defense method and system based on honey pot technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The embodiment of the invention discloses a network defense method and system based on honeypot technology, so as to increase the defense capability of the honeypot and improve the defense effect of the honeypot.

[0044] see figure 1 , a kind of network defense method based on honeypot technology that the embodiment of the present invention provides, comprises:

[0045] S101. The proxy server receives data access traffic, and uses an attack model to detect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network defense method based on a honey pot technology. Malicious flor is introduced into a Web application scene honey pot based on Docker via a proxy server, malicious attack of malicious flow is intercepted through the Web application scene honey pot; thus, in the scheme, through deployment of the Web application scene honey pot based on Docker, network attack can be defensed actively, attack to a real goal by an attacker is delayed, the precious attack tracing time is provided for a defender. The Web application scene honey pot based on Docker also can effectivelyovercome the defect of inadaptability to real scenes of a customer, storage space is effectively reduced through a virtual Docker technology, the network is isolated, interference of honey pots is guaranteed, and the stability of the honey pot is guaranteed through continuous integration. The invention also discloses a network defense system based on the honey pot technology. The system also canhave the technical effects.

Description

technical field [0001] The present invention relates to the technical field of network defense, and more specifically, relates to a network defense method and system based on honeypot technology. Background technique [0002] At present, as an emerging network defense technology, honeypots can not only actively defend against network attacks, but also collect important information about attackers. However, the current status quo is that the network structure of the business system is becoming more and more complex, and the number and types of important applications and servers are increasing. Once hacked, it may greatly affect the normal operation of the system. Although the occurrence of these situations seems to be occasional, it will inevitably become inevitable as the system scale increases over time. However, the existing honeypots cannot simulate the real scene of the customer, which takes up a lot of storage space, and there is no network isolation between many simil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1466H04L63/1491H04L67/02H04L67/562
Inventor 郑天时
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products