Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network deception defense method and device based on host fingerprint hiding

A fingerprint and host technology, used in secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as usability not reaching a practical level, and achieve the effect of easy promotion and implementation and increased difficulty.

Active Publication Date: 2022-01-21
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Facts have shown that such networks and mechanisms are either not usable to a practical level, or can be bypassed by attackers in unexpected ways

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network deception defense method and device based on host fingerprint hiding
  • A network deception defense method and device based on host fingerprint hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings.

[0033] A network spoofing defense method based on host fingerprint hiding. This method performs fingerprint camouflage and obfuscation processing on the protocol packets sent by the host, and presents the attacker with a limited or even completely concealed or wrong attack surface, resulting in attack complexity and attacker The price increases. The method specifically includes the following steps:

[0034] (1) Analyze the scanning rules of common scanning software and the Banner information of common services to form a host fingerprint information database;

[0035] (2) Formulate a host fingerprint hiding strategy, using the host IP address and protocol type as an index. The hiding strategy includes two fingerprint hiding methods of camouflage and confusion, and the type of false fingerprint information specified for the fingerprint camouflage method;

[0036] (3) A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network deception defense method and device based on host fingerprint hiding, and belongs to the technical field of network deception defense. It adds a host fingerprint hiding mechanism where the host accesses the network, and hides the fingerprint characteristics of the host through camouflage or obfuscation methods to achieve network deception defense against attackers. The present invention stores various types of host fingerprint information by building a host fingerprint information database, performs fingerprint camouflage or obfuscation processing on IP data packets sent by the host according to the host concealment strategy, and performs IP data packet specific protocol according to legal host fingerprint information in the host fingerprint information database. Field processing, replacing or changing the real fingerprint information of the host, presenting false or constantly changing host fingerprint features to the attacker, realizing the hiding of the real fingerprint information of the host, making the host fingerprint information detected by the attacker false or uncertain , realizing the security defense of the host system.

Description

technical field [0001] The invention relates to the technical field of network deception defense, in particular to a network deception defense method and device based on host fingerprint hiding. Background technique [0002] The results of long-term network attack and defense practice show that the cost of both attackers and defenders presents a serious situation of "easier to attack and harder to defend": the network defender needs to protect complex systems with multiple unknown vulnerabilities at an exponentially increasing cost, while network attacks However, a party only needs to find one or a few exploitable vulnerabilities to attack the system. The objective reasons leading to this situation include several aspects: [0003] (1) Due to the limitations of human scientific and technological capabilities and engineering skills, loopholes in information systems are common; [0004] (2) Under the globalization pattern of the information industry, it is very easy to impla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/20
Inventor 贾哲李炳彰张林杰朱晓明刘蓓李吉良赵海强
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products