A Same-origin Attack Analysis Method for Industrial Control Honeypots
An analysis method and honeypot technology, applied in the direction of digital transmission system, instrument, calculation, etc., can solve the problem that the method and principle are not applicable, and the same-origin attacker or attack organization cannot be found in the industrial control honeypot.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The technical solutions of the present invention will be further described in more detail below in conjunction with specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0038] This embodiment provides an example of a homologous attack analysis method using the method of the present invention.
[0039] like figure 1 As shown, a kind of same-origin attack analysis method for industrial control honeypot provided by the present invention comprises the following steps:
[0040] 1) Based on the Conpot honeypot framework, construct a Modbus industrial control protocol honeypot, and distribute it on the Internet for data collection; perform data preprocessing according to the Conpot h...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


