Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System-level honeypot network isolation system based on linux network filter

A network filter and network isolation technology, applied in the field of network security, can solve problems such as business system intrusion and threat to business security

Active Publication Date: 2020-02-14
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a system-level honeypot network isolation system based on a linux network filter, to solve the technical problem that the existing honeypot has the risk of business system being invaded and threatens the normal business security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System-level honeypot network isolation system based on linux network filter
  • System-level honeypot network isolation system based on linux network filter
  • System-level honeypot network isolation system based on linux network filter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. the embodiment. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0042] The terms "including" and "having" mentioned in the embodiments of the present application and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes other unlisted steps or units, or optionally ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system-level honeypot network isolation system based on a linux network filter, and relates to the technical field of network security, and the corresponding method comprisesthe steps: determining outgoing flow which comprises a target IP; judging whether the target IP is in the honeypot IP set or not; if not, judging whether the target IP is in the service IP set or not;and if not, discarding the outgoing flow. The technical problem that for an existing honeypot, the risk that a service system is invaded exists, and normal service safety is threatened is solved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a system-level honeypot network isolation system based on a linux network filter. Background technique [0002] Honeypot technology is a network security technology developed based on the concept of deception defense. It differs from traditional network security technologies in that traditional network security devices are usually access switches, and firewalls monitor network traffic upstream. The honeypot network security is generally positioned at the security protection of the user's business network. [0003] Honeypots are usually deployed on the same network as servers in the business environment. This requires that the honeypot network cannot be breached. Once an attacker escapes from the honeypot network to the business environment, it will cause immeasurable losses. [0004] However, for the current honeynet engine, it is very easy for an attacker t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0236H04L63/1491
Inventor 陈学亮范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products