Attack countering implementation system and method based on honeypot technology
A technology of honeypot technology and system implementation, which is applied in the field of anti-attack implementation system based on honeypot technology, which can solve the problem of inability to reverse control the attacker, difficulty in obtaining effective information of the attacker and tracing the source, and the inability of traditional honeypots to counterattack To control attackers and other issues, achieve the effects of easy scale promotion and use, simple implementation methods, and simple and reasonable system settings
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] refer to figure 1 , an attack countermeasure implementation system based on honeypot technology, including a honeypot host 1, a honeypot environment deployment module 2, a countermeasure mechanism setting module 3 and a countermeasure module server 4, which are set in the attacker's host and network environment There is a counter module client 5 for collecting information, and the honeypot host 1 includes a specific document 101 and a specific system mechanism 102;
[0033] The honeypot environment deployment module 2 sends the signal to the honeypot host 1, the counter mechanism setting module 3 sends the signal to the specific document 101 and the specific system mechanism 102 in the honeypot host 1, and the specific Both the document 101 and the specific system mechanism 102 send signals to the counter module client 5 , and the counter module client 5 sends signals to the counter module server 4 .
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

