Method and system for constructing large-scale trapping scene based on cloud computing

A large-scale, cloud computing technology, applied in the field of network security, to achieve the effect of improving security, enhancing uniqueness, and high classification efficiency

Active Publication Date: 2020-11-13
北京元支点信息安全技术有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional honeypots can only use fixed and rigid methods to deceive attackers. With the continuous improvement of attack levels, it is necessary to use more dynamic, novel and flexible multi-dimensional deception baits to build new honeypots to achieve better and more Faster and more accurate deception of the attacker's purpose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for constructing large-scale trapping scene based on cloud computing
  • Method and system for constructing large-scale trapping scene based on cloud computing
  • Method and system for constructing large-scale trapping scene based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] like figure 1 Shown, the method for constructing a large-scale trapping scene based on cloud computing, the method performs the following steps:

[0035] Step 1: Establish multiple clouds with the same application layer, transport layer, network layer, link layer and physical layer as the local side, and each cloud is regarded as a mirror decoy container on the local side;

[0036] Step 2: Collect local-side bait resource data, which at least includes: user behavior data, application usage data, network environment data, login credential data, file data, and traffic data; Preprocessing, obtain the preprocessing data, classify the preprocessing data, and add labels to each sub-dataset obtained after classification; then perform learning mapping based on the sub-datasets with labels to complete the training of the classifier; based on adding The sub-dataset of the label is trained using the established clustering model to complete the training of the clusterer;

[0037]...

Embodiment 2

[0042] On the basis of the previous embodiment, in the step 1, the method of setting up the same cloud as the application layer, transport layer, network layer, link layer and physical layer of the local end performs the following steps: Execute on the remote cloud server Builder application program, the remote cloud server includes processor, memory, operating system, and storage space for storing software application program and creating cloud image; providing said software application program, which includes application program code and application program data; reading a device configuration file indicating configuration settings for use with the software application, including one or more virtual machines, class paths, and environment variable settings; receiving information about the type of manager to be used with the application instructions; write the interface device of the virtual machine that is specific to the manager type and conforms to the configuration settings...

Embodiment 3

[0045] On the basis of the previous embodiment, the method for data preprocessing in step 2 performs the following steps: for the collected local end data, remove unique attributes, process missing values ​​and abnormal value detection and processing; and then perform data processing Reduction processing, including: removing the mean value, calculating the covariance matrix, calculating the eigenvalues ​​and eigenvectors of the covariance matrix, sorting the eigenvalues ​​from large to small, retaining the largest eigenvector, converting the data to a new space constructed by the eigenvector In; finally the new data after processing.

[0046] Specifically, data reduction refers to minimizing the amount of data while maintaining the original appearance of the data as much as possible (the necessary prerequisite for completing this task is to understand the mining task and be familiar with the content of the data itself). For small or medium-sized datasets, general data preproce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of neural networks, and especially relates to a method and a system for constructing a large-scale trapping scene based on cloud computing. The method comprises the following steps that 1, a plurality of clouds which are the same as an application layer, a transmission layer, a network layer, a link layer and a physical layer of a local end are established, and each cloud is regarded as a mirror image bait container of the local end; 2, bait resource data of a local end are collected, wherein the bait resource data at least comprise user behavior data, application use data, network environment data, login credential data, file data and flow data; and for the collected local end data, data preprocessing is performed to obtain preprocessed data, and data classification is performed on the preprocessed data. According to the method, the bait resource data is subjected to classified learning to ensure that different bait resource data can be subjected to more adaptive model training, so that the generated bait is more fraudulent.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method and a system for constructing a large-scale trapping scene based on cloud computing. Background technique [0002] With the continuous popularization of the Internet, more and more units and personal computers are connected to the Internet, and network security problems are becoming more and more serious. Every host on the Internet may be attacked. In recent years, hackers have repeatedly invaded corporate networks. How to ensure enterprise network security and build a safe and reliable enterprise network has become an urgent problem to be solved. [0003] A honeypot is like an intelligence collection system, and a honeypot seems to be an intentional target to lure hackers to attack. So after the attacker invades, you can know how he succeeded, and keep abreast of the latest attacks and vulnerabilities launched against the server. It is also possib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1491G06F18/23G06F18/24323G06F18/214
Inventor 任俊博
Owner 北京元支点信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products