Supercharge Your Innovation With Domain-Expert AI Agents!

A method, system, device and storage medium for discovering potential threats in a network

A potential and network technology, applied in the field of discovering potential threats in the network, can solve problems such as poor flexibility, difficulty in changing camouflage methods and specific parameters, and poor integration, so as to achieve better use effect, flexible camouflage deployment and change, and good camouflage effect of effect

Active Publication Date: 2022-01-21
SANGFOR TECH INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing technology, the computing resources used to build honeypots or honeynets (consisting of multiple honeypots) need to be provided by additional hardware, and are usually arranged in front of the real network in a one-step manner, so that it is ahead of the real network Capture attack information, this method requires high deployment costs and change costs, because it requires cumbersome initial setup steps, it also makes it difficult to change the camouflage method and specific parameters, poor flexibility, and there is also integration with the real network Lack of tightness leads to the possibility of being seen through by the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system, device and storage medium for discovering potential threats in a network
  • A method, system, device and storage medium for discovering potential threats in a network
  • A method, system, device and storage medium for discovering potential threats in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The core of this application is to provide a method, system, device and computer-readable storage medium for discovering potential threats in the network, directly install the camouflage program on each terminal, and directly modify the external information without affecting the normal use of each terminal. Some parameters are used to lure malicious attackers to take the bait. Since the parameters for camouflage are usually limited to common parameters such as IP, port, and service, and only create a false impression for the outside world, the computing resources occupied are negligible. At the same time, the upper-level centralized management platform is used Combined with the current security status of the entire network, comprehensively plan how each terminal needs to camouflage to achieve a better camouflage effect as a whole. Since each camouflage program only needs to camouflage the parameters of the terminal where it is located, camouflage deployment and changes ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method for discovering potential threats in the network. It directly installs the camouflage program on each terminal, and directly modifies some external parameters without affecting the normal use of each terminal, so as to lure malicious attackers into taking the bait. Due to the The disguised parameters are usually limited to common parameters such as IP, port, and service, and only create an illusion for the outside world, occupying negligible computing resources. At the same time, the upper-level centralized management platform is used to comprehensively plan the needs of each terminal in combination with the current security status of the entire network. How to camouflage to achieve a better camouflage effect as a whole. Since each camouflage program only needs to camouflage the parameters of the terminal where it is located, camouflage deployment and changes are more flexible, and the actual use effect is better. The present application also discloses a system, device and computer-readable storage medium for discovering potential threats in the network, which have the above-mentioned beneficial effects.

Description

technical field [0001] The present application relates to the field of honeypot (camouflage) technology, and in particular to a method, system, device and computer-readable storage medium for discovering potential threats in a network. Background technique [0002] With the advent of the information age, people can complete all kinds of work and tasks based on the network, which is not only efficient but also very convenient. Although the information stored in binary format is easier to save, it is also convenient. Therefore, in order to ensure the security of enterprise network, network security equipment came into being. [0003] Traditional network security devices are mainly composed of firewalls, IPS (Intrusion Prevention System, intrusion prevention system), these are only based on fixed threat detection rules or behavior patterns to identify potential network threats, after the attacker sees through the detection means, It is easy to use mutated malicious files or ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1441H04L63/20
Inventor 高群凯
Owner SANGFOR TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More