Web honeypot system based on intelligent questions and answers

An intelligent question answering and honeypot technology, applied in transmission systems, special data processing applications, instruments, etc., can solve the problems of complex deployment configuration, lack of policy level, deception, etc.

Inactive Publication Date: 2020-01-21
SICHUAN UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still many deficiencies in existing research results and engineering practices. High-interaction honeypots can attract deeper attacks, but they have disadvantages such as high deployment risks and complex deployment configurations; low-interactio...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web honeypot system based on intelligent questions and answers
  • Web honeypot system based on intelligent questions and answers
  • Web honeypot system based on intelligent questions and answers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention consists of the following five modules which jointly constitute a honeypot system. The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0046] The honeypot and the network deception technology derived from it are tools to change the asymmetry of attack and defense. Semantic-based intelligent Q&A Web honeypots use contextual semantics to replace traditional single attack vector recognition, which can more correctly and semantically feed back the malicious behavior of attackers, and can improve the performance of Web honeypot systems in dynamic feedback, adaptive configuration, visual deception and The reliability and success rate of attack trapping. The specific technical scheme is as follows.

[0047] Such as Figure 1 Shown is a schematic diagram of the overall framework of the model of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a self-adaptive Web honeypot system based on an intelligent question and answer technology. The self-adaptive Web honeypot system is used for deep complete attack chain capture. An intelligent question-answering technology is utilized, the system is composed of three main algorithm models, question analysis is carried out on attacker messages based on an LSTM model of an attention mechanism, and key attack vectors in the attacker messages are extracted; dynamically generating deception feedback according to the attack vector based on a sensitive information counterfeiting model of the SeqGAN; the Web application learning model based on external observation uses an external observation mode to self-adaptively learn application features. According to the honeypot system, context semantics are used for replacing traditional honeypot spoofing, and generative intelligent question and answer response can be carried out.

Description

technical field [0001] The invention relates to an adaptive WEB honeypot system based on intelligent question answering technology, which is used for deep-level complete attack chain capture. Using intelligent question answering technology, the system is composed of three main algorithm models. The LSTM model based on the attention mechanism analyzes the attacker's message and extracts the key attack vectors; the sensitive information forgery model based on SeqGAN is dynamically generated according to the attack vector. Deception feedback; Web application learning model based on external observation uses external observation to adaptively learn application features. The honeypot system uses contextual semantics to replace traditional honeypot deception, and can generate intelligent question-answer responses. Background technique [0002] Cyberspace has become an important factor affecting national security, international relations, and the political landscape. The Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F16/332G06N3/04G06N3/08
CPCH04L63/1416H04L63/1433H04L63/1491H04L63/20H04L67/02G06F16/3329G06N3/08G06N3/044G06N3/045
Inventor 黄诚方勇龙啸高健
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products