Honey pot deployment method

A honeypot and business technology, applied in the field of digital information transmission, can solve problems such as the inability to realize automatic port opening, achieve the effects of reducing manual deployment of nodes and honeypot deployment, improving log tracking, and simple operation

Inactive Publication Date: 2020-07-17
广州锦行网络科技有限公司
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, honeypots and decoys cannot automatically open ports according to the attack behavior of the attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honey pot deployment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] Such as figure 1 Shown is a honeypot deployment method, including the following steps:

[0038] S1. The configuration document configures parameters such as connection accounts, passwords, IP addresses and port numbers of multiple designated business areas, and classifies the designated business areas in the configuration document;

[0039] S2. The honeypot management system establishes connections with multiple designated business areas;

[0040] S3. The trapping node program is distributed to each designated business area in batches through the honeypot management system, and the trapping node program is automatically installed;

[0041] S4. The trapping node program establishes a connection with the honeypot management system;

[0042] S5. Open but not run all service application ports in multiple designated business areas;

[0043] Run the corresponding service application according to the behavior of the attacker, and close the ports of other service application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a honeypot deployment method, and relates to the technical field of digital information transmission. The method comprises the following steps: S1, configuring parameters of aplurality of specified service areas for a configuration document; S2, establishing connection between a honeypot management system and the plurality of specified service areas; S3, issuing the trapping node programs to all the designated service areas in batches through the honeypot management system, and automatically installing the trapping node programs; and S4, establishing connection betweenthe trapping node program and the honeypot management system. According to the method, the trapping node program is deployed in the designated service area, the trapping node program can be rapidly connected with the honeypot system, the honeypot is rapidly and automatically deployed, and the manual node deployment link and the honeypot deployment link are reduced.

Description

technical field [0001] The invention relates to the technical field of digital information transmission, in particular to a honeypot deployment method. Background technique [0002] Honeypot technology lures the attacker to attack them by arranging some hosts, network services or information as bait, and captures and analyzes the attack behavior to understand the attack intention and motivation of the attacker. [0003] The deployment of the existing honeypot is to download the trapping node program by technicians first, and then deploy the trapping node program in multiple designated business areas such as Windows, Linux, OS systems, etc. After the deployment is completed, add the designated business area to the honeypot system , Adjust application services, the entire deployment process is extremely cumbersome. [0004] The Chinese invention "honeypot deployment method, device and cloud server" with publication number CN107222515A provides a honeypot deployment method, de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1491
Inventor 曾曙林
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products