Attack perception method, device and equipment based on honeypot induction and medium

An attack perception and honeypot technology, applied in electrical components, transmission systems, etc., can solve the problems of attack behavior induction and unrecognized attack behavior, and achieve the effect of protecting security and improving the success rate of induction.

Active Publication Date: 2020-02-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the technical problem that the traditional detection method in the prior art cannot induce the attack behavior and cannot identify the attack behavior that fails to match the security policy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack perception method, device and equipment based on honeypot induction and medium
  • Attack perception method, device and equipment based on honeypot induction and medium
  • Attack perception method, device and equipment based on honeypot induction and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack perception method, device and equipment based on honeypot induction and a medium. The method comprises the following steps: filtering a captured data package to obtain a first target data package, and outputting the first target data package to a user mode process; determining a target communication induction strategy corresponding to the first target data packetin a user mode process, and communicating with a source Internet protocol address corresponding to the first target data packet based on the target communication induction strategy to capture at leastone second target data packet sent by the source Internet protocol address; and determining the first target data packet and/or the second target data packet corresponding to the first target data packet as a to-be-analyzed data packet, analyzing the to-be-analyzed data packet based on a preset analysis rule set, and analyzing an attack behavior according to an analysis result. The system has thedual advantages of an intrusion detection system and a honeypot system, attack information can be captured more comprehensively, and the safety of the network is protected.

Description

technical field [0001] The invention relates to the field of intrusion detection, in particular to an attack perception method, device, equipment and medium based on honeypot induction. Background technique [0002] The intrusion detection system refers to a system that monitors the operating status of the network and the system according to a certain security strategy, discovers various attack attempts, attack behaviors or attack results as much as possible, and raises an alarm. The traditional intrusion detection system matches the intrusion behavior through the security policy, so as to achieve the purpose of detection. However, this traditional detection method cannot induce the attack behavior, and cannot identify the attack behavior that fails to match the security policy. Contents of the invention [0003] In order to solve the technical problem that the traditional detection method in the prior art cannot induce the attack behavior and cannot recognize the attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/1416H04L63/1441H04L63/205
Inventor 宋兵朱少扬董志强
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products