Network camouflage method, device, equipment and computer readable storage medium

A network camouflage, host technology, applied in the field of network security, can solve the problem of honeypots or honeynet being seen through by attackers

Active Publication Date: 2020-08-18
上海沪景信息科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a network camouflage method, device, equipment and computer-readable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network camouflage method, device, equipment and computer readable storage medium
  • Network camouflage method, device, equipment and computer readable storage medium
  • Network camouflage method, device, equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0085] Based on the first embodiment, the second embodiment of the network camouflage method of the present invention is proposed. In this embodiment, after step S10, it also includes:

[0086] Step a, when receiving the second attack packet sent by the attacker, converting the fake address in the destination address of the second attack packet into the honeypot address of the honeypot;

[0087] Step b, sending the second attack packet to the honeypot;

[0088] Step c, after receiving a second response packet matching the second attack packet, converting the address information in the source address of the second response packet into the spoofed address, and sending the second response packets are sent to the attacker.

[0089] In one embodiment, after receiving the first attack packet sent by the attacker, if the second attack packet sent by the same attacker is subsequently received, it means that the real host successfully authenticates with the attacker through the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network camouflage method, a device, equipment and a computer readable storage medium, the network camouflage method comprises the following steps: when a first attack packetsent by an attacker is received for the first time, converting a camouflage address in a destination address of the first attack packet into a real address of a real host; sending the first attack packet to the real host; and when a first response packet matched with the first attack packet is received, converting address information in a source address of the first response packet into the camouflage address, and sending the first response packet to the attacker. According to the method, after capturing a first attack packet sent by an attacker, the target address in the attack packet is converted into the real address of the real host, the attacker is oriented to the real host, and the real host accurately responds to the attacker, so that the simulation degree of the honeypot or honeynet is improved, and the technical problem that the traditional honeypot or honeynet is easily broken by the attacker is solved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network camouflage method, device, equipment and computer-readable storage medium. Background technique [0002] A honeypot is a security resource whose value lies in being scanned, attacked and compromised. This definition implies that the honeypot serves no real purpose, so all network traffic to / from the honeypot may indicate scanning, attacks, and compromises. The honeynet is a new concept gradually developed in the honeypot technology, also known as the trapping network, which consists of a honey wall and several honeypots. Honeynet technology is essentially a research-type high-interaction honeypot technology, and its main purpose is to collect hacker attack information. But the difference with the traditional honeypot technology is that the honeynet constitutes a hacker entrapment network architecture. [0003] Honeynet has three core requirements, namely data control,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1416
Inventor 苏江明
Owner 上海沪景信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products