Mimicry honeypot fingerprint confusion system and method and SDN network architecture thereof

A honeypot and fingerprint technology, applied in the field of mimetic honeypot fingerprint obfuscation system, can solve the problems of difficult to resist fingerprint sniffing and isolated static defense, so as to reduce the fingerprint recognition rate, ensure security and reliability, and avoid impact. Effect

Active Publication Date: 2019-01-18
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a mimetic honeypot fingerprint obfuscation system, method and its SDN network architecture, which solves the problems that the existing honeypot technology is difficult to resist fingerprint s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry honeypot fingerprint confusion system and method and SDN network architecture thereof
  • Mimicry honeypot fingerprint confusion system and method and SDN network architecture thereof
  • Mimicry honeypot fingerprint confusion system and method and SDN network architecture thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0029] At present, honeypot fingerprints are difficult to hide, and isolated static defenses are difficult to effectively protect network security. For this reason, embodiment of the present invention, see figure 1 As shown, a mimetic honeypot fingerprint confusion system is provided, including: a distributor and a control center, wherein,

[0030] The control center, deployed on the distributor, is used to maintain the working status of the honeypot, dynamically generate the scheduling rules of the honeypot according to the suspicious traffic behavior characteristics fed back by the honeypot, and start and close the corresponding honeypot according to the scheduling rules;

[0031] Distributor, deployed between the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication safety, and especially relates to a mimicry honeypot fingerprint confusion system and method and an SDN network architecture thereof. Thesystem comprises a control center which is deployed on a distributor and is used for maintaining the working state of a honeypot, dynamically generating a honeypot scheduling rule according to the suspicious traffic behavior characteristics fed back by the honeypot, and starting and closing the corresponding honeypot according to the scheduling rule; a distributor which is deployed between a honeypot group and a suspicious traffic source and is used for receiving the outputted suspicious traffic, recording the suspicious traffic, broadcasting the suspicious traffic to each honeypot in the honeypot group, receiving response messages from the honeypots, and transmitting the response messages to the suspicious traffic source as false response messages for replying to a corresponding attacker,wherein the honeypot group contains multiple types of honeypots. The method utilizes a dynamic transformation mechanism to comprehensively schedule a plurality of honeypots, reduces the influence onthe safety performance of the network from a condition that a single honeypot system is controlled by the attacker, and improves the reliability of the entire system.

Description

technical field [0001] The invention belongs to the technical field of communication security, and in particular relates to a mimetic honeypot fingerprint obfuscation system, method and SDN network architecture thereof. Background technique [0002] With the rapid development of network technology, network security threats are also emerging in an endless stream. Attackers can attack network weaknesses and loopholes to carry out activities such as information theft and system destruction, which seriously threatens network security. A honeypot system is a network resource that is deployed on the network and has the value of attracting and trapping. Its value can only be reflected when it is attacked or compromised. A honeypot is a deception technology aimed at protecting core network components. It only contains false sensitive data and cannot provide normal services to the outside world. Generally, a honeypot can be a network, a host, a service, useless data items in a datab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 陈福才吴奇程国振李向朋扈红超霍树民梁浩刘文彦
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products