Unlock instant, AI-driven research and patent intelligence for your innovation.

Design method of honeypot capture system for IoT terminal devices

A technology of IoT terminals and design methods, applied in transmission systems, digital transmission systems, instruments, etc., can solve problems such as hindering the development of the IoT industry and threatening the safety of users' lives and property, and improve intrusion defense capabilities and effective security defense methods. Effect

Active Publication Date: 2022-07-26
NANJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Various security problems existing in IoT terminal equipment have seriously hindered the development of the IoT industry, and at the same time threatened the lives and property safety of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of honeypot capture system for IoT terminal devices
  • Design method of honeypot capture system for IoT terminal devices
  • Design method of honeypot capture system for IoT terminal devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing, the technical scheme of the present invention is described in further detail:

[0035] Based on Telnet, SSH protocol and HTTP protocol, the present invention respectively designs Telnet, SSH honeypot and HTTP honeypot oriented to terminal equipment of the Internet of Things. By opening different ports and configuring related files, a honeypot capture system is designed specifically for IoT terminal devices.

[0036] like figure 1As shown in the network structure diagram of the honeypot capture system for IoT terminal devices, the settings of the honeypot can detect the whereabouts of the attacker in time, accurately record the attacker's behavior, and collect the attacker's intrusion mode information for further research. Effective protection against threats.

[0037] The honeypot system designs IoT terminal honeypots based on three different protocols, namely (1) Telnet protocol honeypot; (2) SSH protocol honeypot; (3) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a design method of a honeypot capture system oriented to the terminal equipment of the Internet of Things. The honeypot opens common ports and services. After the administrator configures the user name and password library to be used, the attacker tries to input the input on the login interface. After entering the correct username and password, the attacker successfully logs in to the honeypot; at this time, the honeypot will return the protocol and related device information to the attacker. These information are configured by the administrator according to the configuration file in advance, and the attacker can send commands to the honeypot , the honeypot will respond accordingly; then the honeypot will use the built-in Nmap to perform reverse penetration scanning on the attacker to obtain the attacker's open ports and running services; the honeypot will successfully log in to the attacker's host with a weak password Then, execute command on the attacker's host to download and execute the backdoor program, the present invention can capture a large number of attack samples, analyze the attacker's intrusion means and attack methods, and can be used to improve the security of the Internet of Things terminal equipment.

Description

technical field [0001] The invention relates to an Internet of Things terminal device, in particular to a honeypot capturing system, and belongs to the technical field of security protection of Internet of Things terminal devices. Background technique [0002] With the advent of the era of network technology, the development of the emerging Internet of Things industry is unstoppable, and it is rapidly integrated into all aspects of daily life, occupying an important position in the national industry. In the architecture of the Internet of Things, the terminal equipment of the Internet of Things, as an important part of the system, has received more and more attention. Nowadays, IoT devices can be seen everywhere, and they are more and more closely related to people's daily life, which greatly facilitates the public's life. Common IoT devices include cameras, routers, Raspberry Pi, smart homes, etc. At the same time, the number of IoT devices is also increasing. According to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G16Y40/50
CPCH04L63/1491H04L63/166H04L63/168
Inventor 肖甫陈玉沙乐天黄海平
Owner NANJING UNIV OF POSTS & TELECOMM