Method and system for resisting ransomware attacks based on host honeypot

A host and honeypot technology, applied in the transmission system, electrical components, etc., can solve the problems of fueling the arrogance of ransomware attackers, the formation of advanced ransomware attackers, and the formation of deterrent or containment of ransomware by incapable attackers. Protect data and property security, facilitate deployment, and save costs

Active Publication Date: 2019-03-19
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a single detection and defense technology cannot deter attackers or curb the spread of ransomware
At present, there is no complete and effective forensics and traceability technology for advanced ransomware attackers, which has contributed to the arrogance of ransomware attackers to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for resisting ransomware attacks based on host honeypot
  • Method and system for resisting ransomware attacks based on host honeypot
  • Method and system for resisting ransomware attacks based on host honeypot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and comprehensible, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0036] This embodiment designs a set of reliable and effective ransomware defense scheme. figure 1 It is a schematic diagram of fighting against ransomware attacks based on host honeypots in this embodiment. This solution uses host honeypots to detect ransomware attacks in real time, and uses traceability technology to combat ransomware attacks by collecting attacker traceable information.

[0037] Such as figure 2 As shown, it is a schematic diagram of the module composition of the scheme, which is divided into five modules, namely the honeypot environment generation module, attack monitoring module, ransomwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for resisting ransomware attacks based on a host honeypot. The method comprises steps of: 1) building a host honeypot environment in a host group; 2) generating and deploying a honey bait file in the host honeypot, and recording the initial file type and the entropy value state thereof; 3) monitoring the remote login state of the host honeypot, and notifying the host honeypot to start a real-time monitoring behavior, when the system detects that a remote login operation occurs; 4) monitoring the file type and the entropy value information of the honey bait file, and determining ransomware attacks when both the file type and the entropy value have abnormal changes; 5) collecting the traceable information of an attacker host, when the host honeypot detects the ransomware attacks; and 6) sending traceable information of the collected attacker host to a secure host as a traceable clue. According to the method and the system for resisting ransomware attacks based on the host honeypot, the method and the system can protect the data and property security of users and enterprises, by deceiving attackers and defending against ransomware attacksunder conditions of a low consumption and a zero loss.

Description

technical field [0001] The invention belongs to the field of computer network security, and relates to a method and system for resisting ransomware attacks based on host honeypots. Background technique [0002] Ransomware (Ransomware) is widely regarded as a type of malicious software that encrypts data and locks devices as the attack method and extorts ransom as the main purpose. Traditional malware is often designed to be stealthy, collecting private information such as banking credentials, user keystrokes, screenshots, etc. without arousing suspicion. Ransomware exhibits distinct behavioral differences compared to traditional malware, often publicly notifying users of infection with the intent of demanding a ransom. [0003] In recent years, ransomware attacks have intensified and become a serious security threat on the Internet today. While ransomware has caused serious data and property losses to infected users, it has also attracted the full attention of the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145H04L63/1491H04L2463/146
Inventor 王梓晗刘潮歌崔翔刘奇旭
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products