Attack behavior monitoring method, device, equipment and storage medium

A behavioral and monitored technology, applied in computer security devices, instruments, electrical and digital data processing, etc., can solve the problems of many hardware resources and low accuracy, and achieve the effect of lightweight settings and improved accuracy.

Pending Publication Date: 2020-09-11
WEBANK (CHINA)
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a method, device, device and storage medium for monitoring attack behavior, aiming at solving the problem of low accuracy of monitoring attacker's attack behavior through the existing honeypot application and the setting occupancy of the honeypot application. The technical problem that the host has many hardware resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack behavior monitoring method, device, equipment and storage medium
  • Attack behavior monitoring method, device, equipment and storage medium
  • Attack behavior monitoring method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] The present invention provides a method for monitoring attack behavior, referring to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the attack behavior monitoring method of the present invention.

[0038] The embodiment of the present invention provides an embodiment of the attack behavior monitoring method. It should be noted that although the logic sequence is shown in the flow chart, in some cases, the sequence shown here may be executed in a different order. or the steps described.

[0039] Attack monitoring methods include:

[0040] Step S10, acquiring honeypot data through a honeypot probe corresponding to the monitored host.

[0041] Step S20, determining the service type corresponding to the honeypot data, and determining the target honeypot application corresponding to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack behavior monitoring method, a device, equipment and a storage medium, and relates to the field of financial science and technology, and the attack behavior monitoringmethod comprises the following steps: obtaining honeypot data through a honeypot probe corresponding to a monitored host; determining a service type corresponding to the honeypot data, and determining a target honeypot application corresponding to the monitored host according to the service type, one honeypot application corresponding to a plurality of honeypot probes; and through the target honeypot application, monitoring an attack behavior attacking the monitored host according to the honeypot data. According to the method, the lightweight setting of the system architecture between the front-end host and the rear-end honeypot server is realized, and the accuracy of monitoring the attack behavior of an attacker through the honeypot application is improved.

Description

technical field [0001] The present invention relates to the computer technology field of financial technology (Fintech), in particular to an attack behavior monitoring method, device, equipment and storage medium. Background technique [0002] With the development of computer technology, more and more technologies are applied in the financial field. The traditional financial industry is gradually transforming into financial technology (Fintech), and computer technology is no exception. However, due to the security and real-time requirements of the financial industry, it is also Higher requirements for computer technology. [0003] Honeypot technology is essentially a technology to deceive the attacker. By arranging some hosts, network services or information as bait, the attacker is induced to attack them, so that the attack behavior can be captured and analyzed, and the attack behavior can be understood. By analyzing the tools and methods used by the party and speculating ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 李杰
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products