A defense method based on a large number of deployed decoy hosts to detect and intercept intranet attack sources
A technology of attack sources and hosts, which is applied in the field of defense based on the detection and interception of intranet attack sources based on the deployment of a large number of decoy hosts.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] There are 20 computers in a certain intranet, 30 CNC numerical control industrial control computers (with computer CPU, hard disk, memory, peripherals and interfaces, and real-time operating system, control network and protocol, computing power, friendly man-machine interface etc.), connect by TCP / IP protocol, and form local area network by 2 switches of 48 ports before; Utilize the method of this application now, replace traditional switchboard with 2 switching devices. The main working principle is as follows:
[0076] 1) Switching equipment forms a network bridge br0, and binds an intranet address (192.168.5.2) to the bridge br0, and detects the IP and MAC of 20 computers and 30 CNC industrial control computers through ARP Ping;
[0077] 2) The switching device virtualizes 500,000 decoy hosts with virtual IP and MAC at the network layer through the CPU and memory, and binds them in batches on the bridge br0;
[0078] 3) When one of the 20 computers (192.168.5.88) is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


