Unlock instant, AI-driven research and patent intelligence for your innovation.

An attack perception method, device, equipment and medium based on honeypot induction

An attack perception and honeypot technology, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve the problems of attack behavior induction and attack behavior unrecognizable, and achieve the effect of protecting security and improving the success rate of induction

Active Publication Date: 2022-06-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the technical problem that the traditional detection method in the prior art cannot induce the attack behavior and cannot identify the attack behavior that fails to match the security policy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attack perception method, device, equipment and medium based on honeypot induction
  • An attack perception method, device, equipment and medium based on honeypot induction
  • An attack perception method, device, equipment and medium based on honeypot induction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0031] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the invention described herein can be practiced in seque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack perception method, device, device and medium based on honeypot induction. The method includes filtering captured data packets to obtain a first target data packet, and outputting the first target data packet to a user state process; determine the target communication induction policy corresponding to the first target data packet in the user mode process, and communicate with the source Internet protocol address corresponding to the first target data packet based on the target communication induction policy to capture the source Internet At least one second target data packet sent by the protocol address; determining the first target data packet and / or its corresponding second target data packet as a data packet to be parsed, and analyzing the data packet to be parsed based on a preset parsing rule set Analyze and analyze the attack behavior according to the analysis result. The invention combines the dual advantages of the intrusion detection system and the honeypot system, can capture attack information more comprehensively, and protect the security of the network.

Description

technical field [0001] The invention relates to the field of intrusion detection, in particular to a method, device, device and medium for attack perception based on honeypot induction. Background technique [0002] An intrusion detection system refers to a system that monitors the network and system operating conditions according to certain security policies, discovers various attack attempts, attack behaviors or attack results as much as possible, and issues alarms. Traditional intrusion detection systems match intrusion behaviors through security policies to achieve detection purposes. However, this traditional detection method cannot induce attack behaviors, and cannot identify attack behaviors that fail to match security policies. SUMMARY OF THE INVENTION [0003] In order to solve the technical problems that traditional detection methods in the prior art cannot induce attack behaviors and cannot identify attack behaviors that fail to match security policies. Embodi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0227H04L63/1416H04L63/1441H04L63/205
Inventor 宋兵朱少扬董志强
Owner TENCENT TECH (SHENZHEN) CO LTD