Honeypot defense method and system based on mimicry defense, equipment and medium

A technology of defense system and mimetic honey, which is applied in the field of network security, can solve problems such as system hazards and system loopholes, and achieve the effect of improving security

Active Publication Date: 2021-01-05
PURPLE MOUNTAIN LAB +1
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of attack and defense, even a small design negligence may cause serious system loopholes, and attackers may cause serious damage by exploiting these loopholes to attack the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honeypot defense method and system based on mimicry defense, equipment and medium
  • Honeypot defense method and system based on mimicry defense, equipment and medium
  • Honeypot defense method and system based on mimicry defense, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The invention discloses a honeypot defense method, system, equipment and medium based on mimicry defense. The scheme will be further described and explained below in conjunction with the accompanying drawings and embodiments.

[0040] as attached figure 1As shown, a honeypot defense system based on mimic defense, including: presentation layer, control application layer, data layer and acquisition layer;

[0041] The acquisition layer includes a data acquisition subsystem, which is used to collect data in several honeypots; the implementation process of the data acquisition subsystem is shown in the attached Figure 5 As shown, the data collection subsystem mainly relies on the collection and monitoring program deployed inside the honeypot or deployed in the application program inside the honeypot to realize data collection for honeypot access, command execution, file changes, application changes, etc. In addition, the system also implements traffic packet storage for a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a honeypot defense method and system based on mimicry defense, equipment and a medium, which are applied to the technical field of network security. A virtualization managementsubsystem comprises a mirror image management module, a honeypot management module, a virtual network management module and a control scheduler which are connected in sequence, the mirror image management module constructs a mimicry honeypot mirror image through a KVM virtual machine mirror image technology, a plurality of virtual high-interaction honeypots and a mimicry honeypot system are obtained, and the honeypots are mimicry honeypots; the honeypot management module manages the honeypots and monitors the state of the honeypots; the virtual network management module controls the honeypotsystem to perform data access and network communication; and a control scheduler dynamically switches the mimicry honeypots and the network according to the output judgment result of the mimicry honeypots. According to the invention, mimicry defense is combined with the honeypot system, so that the security and controllability of network space security defense are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a honeypot defense method, system, equipment and medium based on mimicry defense. Background technique [0002] The Internet has always been subject to various network security threats, and the network attack methods emerge in endlessly, the means are changeable, and the attack targets are different. In the process of attack and defense, even a small design negligence may cause serious system loopholes, and attackers may cause serious harm by exploiting these loopholes to attack the system. The defender needs to make the defense of the system or node foolproof to ensure complete security. At the same time, the defender knows nothing about the attackers who can come from anywhere in the network, while the system or nodes are completely exposed to the attackers through the network. In such an offensive and defensive game environment, the attacker occupies an active posit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1416
Inventor 王涵卜佑军江逸茗陈博陈韵蔡翰智
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products