Honeypot defense method and system based on mimicry defense, equipment and medium
A technology of defense system and mimetic honey, which is applied in the field of network security, can solve problems such as system hazards and system loopholes, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The invention discloses a honeypot defense method, system, equipment and medium based on mimicry defense. The scheme will be further described and explained below in conjunction with the accompanying drawings and embodiments.
[0040] as attached figure 1As shown, a honeypot defense system based on mimic defense, including: presentation layer, control application layer, data layer and acquisition layer;
[0041] The acquisition layer includes a data acquisition subsystem, which is used to collect data in several honeypots; the implementation process of the data acquisition subsystem is shown in the attached Figure 5 As shown, the data collection subsystem mainly relies on the collection and monitoring program deployed inside the honeypot or deployed in the application program inside the honeypot to realize data collection for honeypot access, command execution, file changes, application changes, etc. In addition, the system also implements traffic packet storage for a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com