Attack data acquisition method and device of honeypot system

A technology of attacking data and honeypots, applied in the computer field, can solve the problems of easy exposure of attackers, fixed operating mechanism, etc., and achieve the effect of improving recognition ability

Active Publication Date: 2020-12-08
浙江木链物联网科技有限公司
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing honeypot system can only simulate some common functions of industrial control equipment, and the operating mechanism is relatively fixed, so it is still easy to be exposed to experienced attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack data acquisition method and device of honeypot system
  • Attack data acquisition method and device of honeypot system
  • Attack data acquisition method and device of honeypot system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0031] The attack data acquisition method of a honeypot system provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the upper computer 101, the real industrial control device 107, the honeypot host 102 and the traffic monitoring device 104 are connected to the external network 106 through the switch 105. The traffic monitoring device 104 is internally equipped with a whitelist rule base and an attack behavior database, and stores attack list, the honeypot host 102 runs a plurality of virtual industrial control d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attack data acquisition method and device of a honeypot system. The method comprises the steps that real industrial control equipment, virtual industrial control equipmentand an upper computer in the honeypot system are operated; wherein the upper computer is used for sending a control instruction to the real industrial control equipment and the virtual industrial control equipment and reading state data; and the flow monitoring device monitors the communication flow information of the honeypot system, and analyzes and records attack behavior data in the communication flow information. By adopting the method, the simulation degree of the honeypot system can be improved, and an cracking of an attacker is prevented.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for acquiring attack data of a honeypot system. Background technique [0002] The industrial control system is composed of control equipment such as DCS / PLC, sensors such as temperature / pressure, and a host computer. It monitors and controls the industrial production process and is the core center of industrial production. With the development of the Industrial Internet, the closedness of the industrial control system is gradually broken. Due to the large number of loopholes in the industrial control system that have not been repaired, the industrial control system has great hidden risks. If it is attacked by the network, it will lead to unpredictable serious consequences. The existing industrial control system protection methods mainly include the deployment of firewalls, intrusion detection and other security protection equipment. From the persp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1408Y02P90/02
Inventor 陈昕伟郭宾雷濛马远洋赵宇章渠丰罗怡靓杨杰朱奕辉向昶宇
Owner 浙江木链物联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products