Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack decoy environment construction method based on system simulator

A system simulation and network attack technology, applied in the field of network security, can solve problems such as lack of capture ability

Inactive Publication Date: 2020-10-27
福建奇点时空数字科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method generally can only provide a limited degree of interaction for the attacker, and does not have the ability to capture some unknown attack methods and security threats; in order to solve the above problems, this application proposes a network attack based on a system simulator Decoy environment construction method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack decoy environment construction method based on system simulator
  • Network attack decoy environment construction method based on system simulator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0027] like Figure 1-2 As shown, a method for constructing a network attack deception environment based on a system emulator proposed by the present invention includes a firewall, an intrusion detection module, a signal detection module, a port redirection module, a virtual environment module and a data capture system;

[0028] The firewall communicates with the signal detection module and the intrusion detection module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network attack decoy environment construction method based on a system simulator comprises a firewall, an intrusion detection module, a signal detection module, a port redirection module, a virtualenvironment module and a data capture system. The firewall is in communication connection with the signal detection module and the intrusion detection module. The signal detection module is used for communication detection of the port redirection module and the intrusion detection module. The signal detection module is in control connection with the virtual environment module. The data capture system is in communication connection with the virtual environment module. The port redirection module is used for receiving the information sent by the intrusion detection module. According to the method, instruction plug-in mounting and monitoring can be carried out on an upper-layer real Guest operating system; the extended dynamic taint analysis technology is used for tracking network data received at the running moment, identifying illegal use of the network data and detecting network penetration attacks, so that automatic attack feature extraction is supported, a complete real operating system and an upper-layer application program are used for construction of a spoofing environment, and the interaction degree is high.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for constructing a network attack deception environment based on a system simulator. Background technique [0002] With the continuous development of network technology, network applications are becoming more and more extensive, and the impact is also increasing, but the challenges that follow are also increasing; cyber attacks (Cyber ​​Attacks, also known as cyber attacks) refer to Offensive actions of any kind against computerized information systems, infrastructure, computer networks or personal computing equipment. The honeypot technology proposed based on the active defense theory system has been increasingly valued in the field of network security. The honeypot mainly attracts and tolerates intrusions through a carefully arranged deception environment, and then understands information about attack ideas, attack tools, and attack purposes. , especially whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1408H04L63/0209
Inventor 黄建福陈瑜靓张晶刘家祥刘琦石小川赵昆杨
Owner 福建奇点时空数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products