Attack defense method, device, equipment, storage medium and system

A technology for storage media and attackers, applied in the field of information security, can solve problems such as insufficient defense range, and achieve the effects of less resource occupation, lower cost, and simple deployment and implementation

Pending Publication Date: 2020-12-25
北京华赛在线科技有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method, device, device, storage medium and system for defending a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method, device, equipment, storage medium and system
  • Attack defense method, device, equipment, storage medium and system
  • Attack defense method, device, equipment, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood as indicating or implying relative importance or implicitly specifying the quantity of the indicated technical features. In the descriptions of the following embodiments, "plurality" means two or more, unless otherwise specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack defense method, device and equipment, a storage medium and a system. The method comprises the following steps: receiving access requests of attackers forwarded by a plurality of probe nodes; collecting attack behavior information according to each access request; according to the attack behavior information, extracting attack behavior characteristics for defendingagainst attacks. According to the invention, the monitoring in a larger range can be realized based on a small amount of high-interaction honeypot, the cost is effectively reduced, the deployment andimplementation are simple, the occupied resources are less, and the problems that a small amount of honeypot nodes are difficult to play a honeypot role and the protection range is not comprehensiveenough in the prior art are solved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device, equipment, storage medium and system for defending against attacks. Background technique [0002] With the rapid development of Internet technology, network information security is becoming more and more important. At present, computer and network leakage cases continue to occur, and the current situation of information security is very severe. Traditional security products such as firewalls and IDS are passive defenses, that is, they can only defend against known attacks. However, with the continuous improvement of attack methods, traditional passive defenses can no longer meet security requirements, and active defense technologies are increasingly popular. people's attention. [0003] In the prior art, active defense is usually carried out through honeypot technology. Honeypot technology is a technology that deceives the attacker. By arr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1416H04L63/1441
Inventor 邓如林李海威陈燕斌陆立业刘峰
Owner 北京华赛在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products