Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security vulnerability defense system based on dynamic camouflage

A network security and defense system technology, applied in transmission systems, electrical components, etc., can solve problems such as powerlessness, and achieve the effect of improving security and stability and reducing utilization value

Active Publication Date: 2020-10-27
张长河
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing defense technologies are powerless in the face of the endless loopholes. Attackers often have enough time to analyze the network architecture, host system, defense technology and find out the loopholes, so as to gradually infiltrate the network and achieve the purpose of attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security vulnerability defense system based on dynamic camouflage
  • Network security vulnerability defense system based on dynamic camouflage
  • Network security vulnerability defense system based on dynamic camouflage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0054] The network security loophole defense system based on dynamic camouflage described in the second preferred embodiment of the present invention is different from the above-mentioned first preferred embodiment in that when the defense system finds that an attacker accesses a real loophole on a real host, It can be falsely responded to or redirected to a honeypot, thereby effectively preventing attackers from exploiting real vulnerabilities on real hosts. Control network, etc., has important practical value. In the network security loophole defense system based on dynamic camouflage described in the second preferred embodiment of the present invention, the management unit (1) can issue the following configuration information to the camouflage unit (4): real host IP, loopholes that actually exist on the real host The feature field and the content of the corresponding fake response, and / or the IP address and port of the redirect honeypot.

[0055] The present invention prop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security vulnerability defense system based on dynamic camouflage. According to basic technical idea of the system, a network dynamic environment is constructed basedon the concept of moving target defense, a large number of dynamic false hosts is constructed around a protected host by using a network spoofing technology, and a dynamic false vulnerability libraryis constructed to trap attackers; in addition, for a real host, a plurality of false vulnerability libraries can be randomly and dynamically generated for the real host. No matter a hacker performs vulnerability scanning on the target host by using a known or unknown vulnerability scanning tool, a false vulnerability in the virtual or real host is touched inescapably, an alarm of a defense systemcan be triggered when the false vulnerability is detected and utilized, and the defense system can automatically position an attacker in real time and cut off a first loop of a network attack chain, so that beforehand defense is realized and the threat of an unknown vulnerability is effectively reduced.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security loophole defense system based on dynamic camouflage. Background technique [0002] With the rapid development of network technology, the Internet has become an indispensable part of human production and life, and the wave of informatization affects every corner of modern civilized society. According to the statistical report released by the China Internet Network Information Center, as of June 30, 2018, the number of Internet users in my country reached 802 million, with a penetration rate of 57.7%; the number of mobile Internet users reached 788 million, and the number of online payment users in my country reached 569 million. While informatization continues to advance, due to the openness of the Internet, various network security issues are also constantly arising. Attackers can easily invade and attack the target network by using technical means such as scann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/14H04L63/10Y02D30/50
Inventor 张长河
Owner 张长河
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products