Defense method and device, client, server, storage medium and system

A client and server technology, applied in the field of network security, can solve problems such as inability to protect network equipment, bypass or attack

Pending Publication Date: 2021-06-04
SANGFOR TECH INC
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the passive defense scheme based on traffic detection can only analyze and defend the attack technology when the attack occurs, but for advanced attack methods, the passive defense scheme may still be bypassed or compromised, so that it cannot protect the network equipment Function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method and device, client, server, storage medium and system
  • Defense method and device, client, server, storage medium and system
  • Defense method and device, client, server, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0052] Terms involved in the embodiments of the present application are explained as follows.

[0053] Honeypot (or called honeypot network, honeypot technology): It is a virtual system or network specially used to lure hackers (or called attackers), and the honeypot can discover, save and analyze the information left by hackers on the computer system. and track their whereabouts at any time, so as to understand the latest technologies and working ideas used by hackers. By obtaining this information, you will better understand the threats encountered by the system and think about how to prevent these threats, so as to gain the greatest initiative in the war against hackers.

[0054] Next Generation Firewall (NG Firewall): It is a high-performance firewall that can comprehen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a defense method and device, a client, a server, a storage medium and a system. The method is applied to the client and comprises the steps of: obtaining honeypot resource information, wherein a camouflage service program is configured according to the honeypot resource information; under the condition that the disguised service program is accessed, forwarding access data for accessing the disguised service program to the server, wherein the server is deployed with a honeypot system; and receiving an analysis result of the server for the access data, and performing corresponding disposal operation based on the analysis result. Thus, by configuring the disguise service program in the client and combining the honeypot system in the server, the client has the active defense capability, and the overall security defense effect is improved; in addition, an attacker can be decoy to attack only by configuring a normal client, so that the deployment cost and the hardware cost are greatly reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a defense method, device, client, server, storage medium and system. Background technique [0002] At present, the way network devices defend against attacks is generally passive defense based on traffic detection, for example, connecting web application protection system (WAF, Web Application Firewall) devices in series, or bypassing them in network links, to detect traffic in the network and blocking. However, the passive defense scheme based on traffic detection can only analyze and defend the attack technology when the attack occurs, but for advanced attack methods, the passive defense scheme may still be bypassed or compromised, so that it cannot protect the network equipment Function. Therefore, how to improve defense capabilities is still a problem in the field of network security. Contents of the invention [0003] The main purpose of this applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/1441H04L63/02H04L63/20
Inventor 邓永茂李翰林泽辉王本春
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products