Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing attack processing, honeypot deployment method, medium and equipment

A honeypot and attacker technology, applied in transmission systems, electrical components, etc., can solve the problems of limited deployment scope, high maintenance costs, and inability to capture attacks, and achieve the goal of expanding capture scope, saving time, and reducing deployment and maintenance costs. Effect

Pending Publication Date: 2020-03-10
ALIBABA GRP HLDG LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of IoT, network attacks against IoT devices are becoming more and more serious, and IoT devices use a wide range of architecture types, such as Advanced Reduced Instruction Set Machine (ARM, Advanced RISC Machine) architecture, Enhanced RISC Performance Optimization (PowerPC, Performance Optimized With Enhanced RISC) architecture, etc., the honeypot technology provided in related technologies, on the one hand, cannot capture attacks against these types of networks; on the other hand, limited by the physical resources and IP resources of honeypot users, honeypot The deployment range of honeypots is limited, so the attack behaviors captured are also limited; moreover, when a large number of honeypots need to be deployed on the Internet, the deployment and maintenance costs of traditional honeypots are relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing attack processing, honeypot deployment method, medium and equipment
  • Method for realizing attack processing, honeypot deployment method, medium and equipment
  • Method for realizing attack processing, honeypot deployment method, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0053] In a typical configuration of the present application, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0054] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0055]Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for realizing attack processing and a honeypot deployment method, and the method at least comprises the steps: pulling a stored honeypot mirror image from ahoneypot mirror image cloud warehouse, wherein the honeypot mirror image is a honeypot structure supporting a multi-CPU architecture; creating a container on the cloud host, wherein the container correspondingly supports honeypots of different CPU architectures; capturing attack data through honeypots supporting different CPU architectures. According to the application, the capture range of honeypots is expanded based on a cloud deployment mode, an elastic and dynamic honeypot cluster management mode is realized, and the value of honeypot data is mined more deeply by combining big data analysis service on the cloud; moreover, based on the characteristics of the container, the honeypot deployment and maintenance cost is reduced, and the time is saved.

Description

technical field [0001] This application relates to but not limited to network attack defense technology, especially a method for realizing attack processing based on the Internet of Things (IoT, Internet of Things), a honeypot deployment method, media and equipment. Background technique [0002] In the offensive and defensive confrontation in cyberspace, honeypot technology is used as an intrusion bait to lure hackers to attack. After the attacker invades, through monitoring and analysis, on the one hand, it can be used to investigate the source of the attacker and the latest attacks and vulnerabilities launched against the server, and on the other hand, to examine whether the security measures used for protection are effective. Among them, a honeypot is a security resource whose value lies in being scanned, attacked, and compromised, that is, the honeypot has no other practical function, and all network traffic flowing into / out of the honeypot may indicate scanning, attacki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1491H04L67/1095
Inventor 王佩
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products