Method for realizing attack processing, honeypot deployment method, medium and equipment

A honeypot and attacker technology, applied in transmission systems, electrical components, etc., can solve the problems of limited deployment scope, high maintenance costs, and inability to capture attacks, and achieve the goal of expanding capture scope, saving time, and reducing deployment and maintenance costs. Effect

Pending Publication Date: 2020-03-10
ALIBABA GRP HLDG LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of IoT, network attacks against IoT devices are becoming more and more serious, and IoT devices use a wide range of architecture types, such as Advanced Reduced Instruction Set Machine (ARM, Advanced RISC Machine) architecture, Enhanced RISC Performance Optimization (PowerPC, Performance Optimized With Enhanced RISC) architecture, etc., the honeypot technology provided in related technologies, on the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing attack processing, honeypot deployment method, medium and equipment
  • Method for realizing attack processing, honeypot deployment method, medium and equipment
  • Method for realizing attack processing, honeypot deployment method, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0052] In order to make the objectives, technical solutions, and advantages of the present application clearer, the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings. It should be noted that the embodiments in this application and the features in the embodiments can be combined with each other arbitrarily if there is no conflict.

[0053] In a typical configuration of this application, the computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0054] The memory may include non-permanent memory in computer readable media, random access memory (RAM) and / or non-volatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0055] Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for realizing attack processing and a honeypot deployment method, and the method at least comprises the steps: pulling a stored honeypot mirror image from ahoneypot mirror image cloud warehouse, wherein the honeypot mirror image is a honeypot structure supporting a multi-CPU architecture; creating a container on the cloud host, wherein the container correspondingly supports honeypots of different CPU architectures; capturing attack data through honeypots supporting different CPU architectures. According to the application, the capture range of honeypots is expanded based on a cloud deployment mode, an elastic and dynamic honeypot cluster management mode is realized, and the value of honeypot data is mined more deeply by combining big data analysis service on the cloud; moreover, based on the characteristics of the container, the honeypot deployment and maintenance cost is reduced, and the time is saved.

Description

technical field [0001] This application relates to but not limited to network attack defense technology, especially a method for realizing attack processing based on the Internet of Things (IoT, Internet of Things), a honeypot deployment method, media and equipment. Background technique [0002] In the offensive and defensive confrontation in cyberspace, honeypot technology is used as an intrusion bait to lure hackers to attack. After the attacker invades, through monitoring and analysis, on the one hand, it can be used to investigate the source of the attacker and the latest attacks and vulnerabilities launched against the server, and on the other hand, to examine whether the security measures used for protection are effective. Among them, a honeypot is a security resource whose value lies in being scanned, attacked, and compromised, that is, the honeypot has no other practical function, and all network traffic flowing into / out of the honeypot may indicate scanning, attacki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1491H04L67/1095
Inventor 王佩
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products