Honeynet implementation system based on real network environment
A real network and system implementation technology, applied in the field of network security, can solve the problem of not being able to fully capture attacker behavior information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] Such as figure 1 , the preferred embodiment of the present invention provides a honeynet implementation system based on a real network environment, including a honeynet deployment management module 2, a network area division module 3, a network access control module 4, a dynamic activity generation module 5 and a honeynet environment 1, More than one group of honeynet sub-environments 101 are set in the honeynet environment 1;
[0036] The honeynet deployment management module 2 is respectively connected to the network area division module 3, the network access control module 4 and the dynamic activity generation module 5, and the honeynet deployment management module 2, the network area division module 3, and the network access control module Both the module 4 and the dynamic activity generating module 5 are connected to the honeynet environment 1 by lines.
[0037] In this embodiment, the number of groups of the honeynet sub-environment 101 is set to two groups.
Embodiment 2
[0039] Such as figure 1 and figure 2 , a honeynet implementation system based on a real network environment, including a honeynet deployment management module 2, a network area division module 3, a network access control module 4, a dynamic activity generation module 5 and a honeynet environment 1, in which a honeynet environment 1 is set The honeynet sub-environment 101 above the group;
[0040] The honeynet deployment management module 2 is respectively connected to the network area division module 3, the network access control module 4 and the dynamic activity generation module 5, and the honeynet deployment management module 2, the network area division module 3, and the network access control module Both the module 4 and the dynamic activity generating module 5 are connected to the honeynet environment 1 by lines.
[0041] In this embodiment, the number of groups of the honeynet sub-environment 101 is set to two groups.
[0042] In this embodiment, the honeynet sub-en...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

