Unlock instant, AI-driven research and patent intelligence for your innovation.

Design method of honeypot capture system for Internet of Things terminal equipment

An IoT terminal and design method technology, applied in transmission systems, electrical components, etc., can solve problems such as hindering the development of the IoT industry and threatening the safety of users' lives and property, and achieve the effect of improving intrusion defense capabilities and effective security defense means.

Active Publication Date: 2020-05-19
NANJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Various security problems existing in IoT terminal equipment have seriously hindered the development of the IoT industry, and at the same time threatened the lives and property safety of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of honeypot capture system for Internet of Things terminal equipment
  • Design method of honeypot capture system for Internet of Things terminal equipment
  • Design method of honeypot capture system for Internet of Things terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0035] Based on the Telnet, SSH protocol and HTTP protocol, the present invention respectively designs Telnet, SSH honeypot and HTTP honeypot oriented to the terminal equipment of the Internet of Things. By opening different ports and configuring related files, a honeypot capture system for IoT terminal devices is designed.

[0036] like figure 1As shown in the network structure diagram of the honeypot capture system for IoT terminal devices, the setting of the honeypot can detect the whereabouts of the attacker in time, accurately record the behavior of the attacker, and collect information about the intrusion mode of the attacker for further research Effective protection against threats.

[0037] The honeypot system designs IoT terminal honeypots based on three different protocols, namely (1) Telnet protocol honeypot; (2) SSH protocol honeypot;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a design method of a honeypot capture system for Internet of Things terminal equipment, and the method comprises the following steps that a honeypot opens a common port and service; after an administrator configures a user name and a password library to be used, an attacker tries to input the user name and the password on a login interface, and the attacker successfully logsin the honeypot after the input is correct; at the moment, the honeypot returns a protocol and related equipment information to the attacker, the information is configured by the administrator in advance according to a configuration file, the attacker can send a command to the honeypot, and the honeypot can make a corresponding response; then the honeypot uses a built-in Nmap to carry out reverseosmosis scanning on the attacker to obtain a port opened by the attacker and a running service; after the honeypot successfully logs in the attacker host through the weak password, the command downloading is executed on the attacker host, and a backdoor program is executed. The method can achieve the effects of capturing a large number of attack samples and analyzing the invasion means and attackmethod of the attacker, and can be used for improving the safety of the Internet of Things terminal equipment.

Description

technical field [0001] The invention relates to a terminal device of the Internet of Things, in particular to a honeypot capture system, belonging to the technical field of security protection of the terminal device of the Internet of Things. Background technique [0002] With the advent of the era of network technology, the development of the emerging Internet of Things industry is unstoppable, quickly integrated into all aspects of daily life, and occupies an important position in the national industry. In the IoT architecture, IoT terminal equipment, as an important part of the system, has received more and more attention. Nowadays, Internet of Things devices can be seen everywhere, and they are more and more closely connected with people's daily life, which greatly facilitates the lives of the public. Common Internet of Things devices include cameras, routers, Raspberry Pi, smart homes, etc. At the same time, the number of IoT devices is also increasing. According to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/166H04L63/168
Inventor 肖甫陈玉沙乐天黄海平
Owner NANJING UNIV OF POSTS & TELECOMM