Method, device, storage medium and electronic device for defending data stream attack

A storage medium and data flow technology, applied in the field of communication, can solve problems such as occupation, limited resources of industrial control terminals, and damage to the operation of industrial control networks

Active Publication Date: 2019-01-22
NEUSOFT CORP
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of information technologies such as the Internet of Things, cloud computing, and big data, the industrial manufacturing industry has gradually broken the previous closedness and deeply integrated industrial control terminals with information technology, thus presenting characteristics such as networking and intelligence. , based on information technology, while improving productivity and enhancing innovation of industrial control terminals, serious network security problems have also emerged. At present, there are mainly two types of attacks on industrial control networks: one is to steal industrial control information, and the other is to destroy The operation of the industrial control network, in this way, caused huge losses to industrial manufacturing enterprises
[0003] Honeypot technology, as an active defense network trapping technology, can directly deploy honeypots on terminals such as computers, so that when the attack data flow attacks the computer, the honeypot can directly lure the attack data flow to Realize the long-term monitoring, detection, analysis and early warning of the attack data flow, so as to ensure that the network can be in a safe state. However, due to the limited resources of the industrial control terminal, the processing capacity of the industrial control terminal is limited. Therefore, if The honeypot is directly configured on the industrial control terminal, and the honeypot takes up a lot of resources, thereby reducing the operating speed of the industrial control terminal, thereby reducing the efficiency of data processing by the industrial control terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, storage medium and electronic device for defending data stream attack
  • Method, device, storage medium and electronic device for defending data stream attack
  • Method, device, storage medium and electronic device for defending data stream attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0059] First of all, the application scenario of the present disclosure is described. The present disclosure can be applied in industrial control networks to defend against data flow attacks through honeypot technology. Among them, the honeypot technology can attack by using real or simulated loopholes to lure attack data flows, thereby Ensure that the network is in a safe state, wherein the honeypot can be a trap program set on the terminal (such as the trap program can be a simulated system vulnerability), so that when the trap program lures the attack data flow to scan or attack, it can Activate the alarm and control decision tree for alarming.

[0060] H...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to a method, device, storage medium and electronic device for defending data stream attack; the data stream and the whole network security rules can be obtained throughthe terminal, and determine the attack data stream from the data stream according to the whole network security rules. At the same time, threat identification is performed on the attack data stream togenerate a threat identifier, the threat identifier indicates the threat level corresponding to the attack traffic; the attack traffic is sent to the honeypot server, so that the honeypot service enddecoys the attack data stream according to the threat level indicated by the threat identification, the terminal sends the attack data stream to the honeypot service end, and the honeypot service enddecoys the attack data stream, thereby reducing the occupation of the terminal resources and improving the data processing efficiency of the terminal.

Description

technical field [0001] The present disclosure relates to the communication field, and in particular, relates to a method, device, storage medium and electronic equipment for defending against data flow attacks. Background technique [0002] With the rapid development of information technologies such as the Internet of Things, cloud computing, and big data, the industrial manufacturing industry has gradually broken the previous closedness and deeply integrated industrial control terminals with information technology, thus presenting characteristics such as networking and intelligence. , based on information technology, while improving productivity and enhancing innovation of industrial control terminals, serious network security problems have also emerged. At present, there are mainly two types of attacks on industrial control networks: one is to steal industrial control information, and the other is to destroy The operation of the industrial control network, in this way, has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1491
Inventor 陈剑闻英友胡旺阳李志李大鹏
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products