Design method of honeypot capture system for IoT terminal devices
A technology of IoT terminals and design methods, applied in transmission systems, digital transmission systems, instruments, etc., can solve problems such as hindering the development of the IoT industry and threatening the safety of users' lives and property, and improve intrusion defense capabilities and effective security defense methods. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Below in conjunction with accompanying drawing, the technical scheme of the present invention is described in further detail:
[0035] Based on Telnet, SSH protocol and HTTP protocol, the present invention respectively designs Telnet, SSH honeypot and HTTP honeypot oriented to terminal equipment of the Internet of Things. By opening different ports and configuring related files, a honeypot capture system is designed specifically for IoT terminal devices.
[0036] like figure 1As shown in the network structure diagram of the honeypot capture system for IoT terminal devices, the settings of the honeypot can detect the whereabouts of the attacker in time, accurately record the attacker's behavior, and collect the attacker's intrusion mode information for further research. Effective protection against threats.
[0037] The honeypot system designs IoT terminal honeypots based on three different protocols, namely (1) Telnet protocol honeypot; (2) SSH protocol honeypot; (3) ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


