Automated security protection method based on association of camouflage agent and dynamic technology

A security protection and related technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as false interception, low accuracy, single protection method, etc., and achieve the effect of accurate real-time protection

Active Publication Date: 2020-11-13
江苏开博科技有限公司 +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional defense methods based on features and rules are starting to show shortcomings: From the perspective of blocking attack sources, they mainly rely on source IP addresses, and the protection method is relatively simple and the accuracy is not high, which may easily lead to false interception
From the perspective of security operation, for massive log information, the cost of manual intervention is high, the efficiency is low, and the operation and maintenance management is difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated security protection method based on association of camouflage agent and dynamic technology
  • Automated security protection method based on association of camouflage agent and dynamic technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The core idea of ​​the present invention is to set the following steps:

[0025] (1) Design a disguised agent;

[0026] (2) Design a traffic analysis system, and import the traffic in the disguised proxy into the traffic analysis system;

[0027] (3) According to the fingerprint information obtained by the traffic analysis system, design a "hacker portrait";

[0028] (4) Design a "Dynamic Protection System" and store hacker portraits in the "Dynamic Protection System"; the dynamic protection system is loaded with existing protection strategies, including: dynamic encapsulation, dynamic verification, dynamic confusion, and dynamic tokens, and will (3 ) The hacker portrait generated by ) is added to the dynamic protection system, and quickly spread to all protection nodes, and the programmable countermeasure module is started simultaneously to load the preset scene protection scheme.

[0029] (5) Design a "blocking mode" to block attackers in real time, use the dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an automatic security protection method based on the association of a camouflage agent and a dynamic technology, and the method specifically comprises the steps: 1, setting the camouflage agent: constructing a new Web service on the basis of an original Web server, and enabling the new Web service to contain a plurality of security holes, thereby inducing an attacker to enter the new Web service; 2, setting a flow analysis system, importing the flow in the disguise agent into a flow analysis system; 3, obtaining fingerprint information according to a flow analysis system, 4, setting a dynamic protection system, and storing the hacker portrait into the dynamic protection system; and 5, generating a user portrait when the user accesses the Web service, matching the user portrait with the hacker portrait in the dynamic protection system, and blocking an attacker in real time if the user portrait is successfully matched with the hacker portrait in the dynamic protection system. According to the invention, blocking is carried out based on the unique hacker portrait, and even if an attacker continuously changes the IP, the attacker can be identified for blocking,so that an accurate and real-time protection effect is achieved.

Description

technical field [0001] The invention relates to an automatic safety protection method based on a masquerade agent associated with a dynamic technology, and belongs to the technical field of network safety attack and defense. Background technique [0002] With the rapid development of the Internet and the continuous innovation and breakthrough of the new generation of information technology, the Internet has brought earth-shaking changes to all aspects of people's lives. At the same time as the digitalization of the Internet is developing, the Internet environment is also subject to a large number of cyber attacks, and the attack methods emerge in endlessly, and the cyberspace security issues faced are becoming more and more complex and diverse. However, in the existing information security system, security managers are still looking for loopholes and patching. The existing protection technology mainly relies on the intrusion detection system. Traditional security signatures...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1491H04L67/02
Inventor 孟军
Owner 江苏开博科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products