Array honey pot cooperative control method based on block chain

A collaborative control and blockchain technology, applied in the field of network security, can solve problems such as loss of defenders, paralysis of the array honeypot system, etc., and achieve the effect of resisting attacks

Active Publication Date: 2018-09-11
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this centralized control mechanism, if a specific central server goes down, the entire array honeypot system will be paralyzed, causing great losses to the defender

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Array honey pot cooperative control method based on block chain
  • Array honey pot cooperative control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technology and advantages of the present invention clearer, the present invention will be further described in detail and completely below in conjunction with the accompanying drawings.

[0023] Step (1): Under the Ethereum platform, use the genesis block file to build a private chain consisting of n hosts in the honeypot inside the array, that is, priChain={host 0 ,host 2 ,...,host n-1}.

[0024] In the step (1), using the genesis file to build a private chain requires data adjustment to the JSON type file, that is, modifying the internal difficulty (difficulty value) parameter. By adjusting the difficulty value, the mining time interval T is within a reasonable range, so that the change cycle of the internal service host of the array honeypot system is at the best defense stage.

[0025] Step (2): In n host computers, build a distributed dynamic array honeypot system with active defense function, i.e. honArray={sys 0 ,sys 2 ,...,sys ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an array honey pot cooperative control method based on a block chain. The method comprises the following steps: constructing a private chain by using an Ethereum platform, andrealizing de-centralized cooperative operation thought of a honey pot host cluster through a mining way; constructing a topological structure consistent with the Ethereum platform starting from a P2Pnetworking model, and realizing the communication through web3J. Each host in the array executes the mining, the host acquiring an accounting charging right can holds the post of a honey pot serviceconversion task at one periodic time, conversion information is sent through an encryption mechanism, and other host receives and executes the corresponding conversion instruction. Furthermore, external port request access data is stored in the block chain by using the tamper resistance of the block chain information, thereby obtaining the digital evidence for implementing the attack by an attacker. Through the method disclosed by the invention, the cooperative operation of the array honey pot host cluster is guaranteed, thereby trapping the attacker by using the true-false service in dynamicconversion, and the network security active defense aim is realized.

Description

technical field [0001] The invention relates to a decentralization method of a network active defense system, specifically a blockchain-based array honeypot collaborative control method, starting from the P2P networking model of the blockchain, realizing the distribution of the array deceiving honeypot hosts It belongs to the field of network security technology. Background technique [0002] In the network attack and defense confrontation in the information age, the defender has adopted various strategies to protect the system. Among them, the deceptive honeypot technology is more active than the traditional defense measures. By constructing false vulnerabilities, services, resources And so on to lure the attacker, to achieve the purpose of consumption attack, and then protect the real system. However, the static honeypot is easily detected by the adversary, so that the adversary can avoid the trap and attack the protected system. Therefore, enhancing the dynamics of hone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/302H04L63/0428H04L63/20H04L67/104
Inventor 石乐义李阳刘天旭李晓雨刘娜崔雯迪刘佳朱红强
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products