Homologous attack analysis method for industrial control honeypot
An analysis method and honeypot technology, applied in the direction of instruments, character and pattern recognition, electrical components, etc., can solve the problems that the method and principle are not applicable, and cannot find the same source attacker or attacking organization of the industrial control honeypot
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The technical solutions of the present invention will be further described in more detail below in conjunction with specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0038] This embodiment provides an example of a homologous attack analysis method using the method of the present invention.
[0039] Such as figure 1 As shown, a kind of same-origin attack analysis method for industrial control honeypot provided by the present invention comprises the following steps:
[0040] 1) Based on the Conpot honeypot framework, construct a Modbus industrial control protocol honeypot, and distribute it on the Internet for data collection; perform data preprocessing according to the Conpo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com