Visual dynamic honeynet custom topology deployment method

A custom, honeynet technology, applied in the computer field, can solve the problems of difficult analysis due to limited view, troublesome deployment, single selection, troublesome maintenance and time-consuming management, etc., to reduce the limited analysis view, reduce complexity, and improve construction efficiency.

Active Publication Date: 2021-02-09
广州锦行网络科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In view of this, the present invention aims at the deficiencies in the prior art, and its main purpose is to provide a visual dynamic honeynet self-defined topology deployment method, which can effectively solve the troublesome deployment of the current honeynet system, single selection, troublesome maintenance and time-consuming management , Honeynets are easy to see through, and view limitations are difficult to analyze

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual dynamic honeynet custom topology deployment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Please refer to figure 1 As shown, the present invention discloses a method for deploying a visualized dynamic honeynet custom topology, including the following steps:

[0037] (1) Input the topology to the honeynet topology custom editing page by manual drawing, data import or picture import. In this embodiment, the manual drawing import method refers to manually dragging the network unit control based on jQuery to enter the topology canvas to generate a preliminary honeynet topology; the middle data import method refers to the import including but not limited to Json, txt, xml Parameter files in other formats to generate a preliminary honeynet topology; the image import method refers to importing image files and generating a preliminary honeynet topology through identification. The image file types include but are not limited to bmp, jpg, png, tif, etc.

[0038] (2) Visually display the preliminary honeynet topology obtained from step (1) on the honeynet topology cus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visual dynamic honeynet custom topology deployment method, which reduces the complexity of constructing a honeynet, improves the construction efficiency, is convenient to maintain, and solves the problems that single honeypots of a current honeynet system are deployed one by one, the selection type of honeypot templates is single, And honeypot service application and vulnerability utilization are simply combined. And moreover, through visualizing the honeynet topology, the complex honeynet topology is more intuitive, the security personnel are helped to grasp the overall honeynet monitoring condition in real time globally, and the troubles that the analysis view of the current honeynet system is limited, and many attack data events are difficult to analyze are reduced. Besides, through the dynamic honeynet topology, the original honeynet topology structure can be dynamically changed, more complex and diversified attack honeynet utilization environments are realized, and the true degree of the honeynet is improved.

Description

technical field [0001] The invention relates to computer technology, in particular to a method for deploying a visualized dynamic honeynet self-defined topology. Background technique [0002] As the scale of the network continues to expand, the computer system becomes more and more advanced, and the threats to the network and computers are also increasing. The attacker can use the computer and the network to attack anytime and anywhere. The attack methods emerge in endlessly and the attack targets are different. Traditional passive defense systems, such as anti-virus gateways, firewalls, and intrusion detection, can no longer adapt to complex and changeable network attacks, and it is difficult to fundamentally solve security problems. [0003] In view of the asymmetry between the attacker and the defender in network security incidents, as long as the defender is negligent and allows the attacker to break through the line of defense, it is very likely to paralyze the entire...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/12H04L41/145H04L63/1491H04L63/20
Inventor 吴建亮胡鹏冯青聪
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products