Unlock instant, AI-driven research and patent intelligence for your innovation.

Message processing method, entry, device, storage medium and processor

A message processing and target technology, applied in the field of network security, can solve problems such as difficulty and high cost, and achieve the effect of defending against attacks

Active Publication Date: 2020-09-22
北京吉安金芯信息技术有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a message processing method, entry, device, storage medium and processor to solve the problem of difficulty and high cost in the related art of using network equipment to defend against intruders' attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message processing method, entry, device, storage medium and processor
  • Message processing method, entry, device, storage medium and processor
  • Message processing method, entry, device, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034]In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0035] It should be noted that the terms "first" and "second"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message processing method, an entry, a device, a storage medium and a processor. The method comprises the steps that: an access request sent by a target host is received through a target switch, and the access request carries a to-be-accessed destination address; it is judged whether the destination address is the address of the target virtual host or not; under the condition that the destination address is the address of the target virtual host, a response host corresponding to the target virtual host is determined according to the address conversion relation table,and the response host is used for responding to the access request to interfere with the access behavior of the target host. Through application of the invention, the problems of high difficulty and high cost of defending the attack behavior of the intruder by adopting the network equipment in related technologies are solved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a message processing method, entry, device, storage medium and processor. Background technique [0002] In network activities, there are a large number of destructive behaviors of network attackers, which greatly affect network security. Therefore, defense strategies need to be deployed to ensure network security. [0003] In order to improve the defense effect, a method of using network deception technology for active defense has appeared in related technologies. For example, traditional honeypot technology is used to realize network camouflage, but its deployment requires a lot of host resources and network resources of users, is easy to be identified by intruders, and the workload of application high-interaction simulation development is huge. Another example is to use special network trapping equipment for defense, but this method has high deployment cost...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/947G06F9/455
CPCH04L63/1466H04L61/2539H04L61/255H04L49/25G06F9/45558G06F2009/45595H04L2101/622
Inventor 贺雪峰
Owner 北京吉安金芯信息技术有限公司