Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack countering implementation system and method based on honeypot technology

A technology of honeypot technology and system implementation, which is applied in the field of anti-attack implementation system based on honeypot technology, which can solve the problem of inability to reverse control the attacker, difficulty in obtaining effective information of the attacker and tracing the source, and the inability of traditional honeypots to counterattack To control attackers and other issues, achieve the effects of easy scale promotion and use, simple implementation methods, and simple and reasonable system settings

Inactive Publication Date: 2018-06-08
广州锦行网络科技有限公司
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Traditional honeypots can only passively wait for the attacker's attack, and cannot take effective countermeasures against the attacker. Currently, a method that can effectively counter the attacker is needed, changing passive defense into actively tracking the attacker. Effective traceability and reverse control technology methods
[0006] In the existing technology, it is difficult to obtain the effective information of the attacker and trace the source through the honeypot, let alone control the attacker in reverse, which has significant defects:
[0007] (1) The attacker enters the honeypot through multiple springboards, and it is difficult to directly obtain the information of the attacker's real host from the honeypot;
[0008] (2) Traditional honeypots cannot reversely control attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack countering implementation system and method based on honeypot technology
  • Attack countering implementation system and method based on honeypot technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] refer to figure 1 , an attack countermeasure implementation system based on honeypot technology, including a honeypot host 1, a honeypot environment deployment module 2, a countermeasure mechanism setting module 3 and a countermeasure module server 4, which are set in the attacker's host and network environment There is a counter module client 5 for collecting information, and the honeypot host 1 includes a specific document 101 and a specific system mechanism 102;

[0033] The honeypot environment deployment module 2 sends the signal to the honeypot host 1, the counter mechanism setting module 3 sends the signal to the specific document 101 and the specific system mechanism 102 in the honeypot host 1, and the specific Both the document 101 and the specific system mechanism 102 send signals to the counter module client 5 , and the counter module client 5 sends signals to the counter module server 4 .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack countering implementation system based on a honeypot technology. The attack countering implementation system based on the honeypot technology comprises a honeypot host, a honeypot environment deployment module, a countering mechanism setting module and a countering module service side; a countering module client side used for information acquisition is arranged ina host and a network environment, where an attacker is; the honeypot host includes a specific document and a specific system mechanism; and information acquired by the countering module client side includes obtaining of attacker information and controlling of an environment, where an attacker is. The attack countering implementation system based on the honeypot technology is simple and reasonableto set; the problem that effective tracing and reverse control cannot be carried out due to the fact that the honeypot only can passively wait for an attacker in the past can be solved; and an attackcountering implementation system based on the honeypot technology is simple, and easy in large-scale popularization and application.

Description

technical field [0001] The invention relates to the technical field of network security, more specifically, it relates to a system and method for implementing attack countermeasures based on honeypot technology. Background technique [0002] In recent years, computer networks have developed rapidly in recent years. During the rapid development of the network, the maturity of network technology makes network connection easier. While people enjoy the convenience brought by the network, the security of the network is increasingly threatened. [0003] Network attack behavior is becoming more and more complex, and various methods are integrated with each other, making network security defense more difficult. Hacker attacks are more organized, and the target of the attack has shifted from the simple pursuit of "glory" to the direction of obtaining various practical benefits. The emergence and increasing proliferation of online Trojan horses, spy programs, malicious websites, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/20H04L2463/146
Inventor 胡鹏王俊卿吴建亮
Owner 广州锦行网络科技有限公司