Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Honeynet architecture implementation method for cloud plug-in type vulnerability response

An implementation method, a plug-in technology, applied in the direction of electrical components, instruments, platform integrity maintenance, etc., can solve the problems of honeypot information isolation, multiple component responses, and untimely threat intelligence sharing, and achieve the effect of protecting response time

Active Publication Date: 2021-07-02
江苏天翼安全技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The honeypot in the existing technology is old and cannot adapt to the latest attack methods. The honeynet is separated from the real environment of the user and cannot respond to the vulnerabilities of various components. The existing honeypot cannot automatically update the simulation sandbox plug-in, and the existing honeypot cannot Adapt to the real assets of users, the existing honeypot information is isolated, and the sharing of threat intelligence is not timely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honeynet architecture implementation method for cloud plug-in type vulnerability response
  • Honeynet architecture implementation method for cloud plug-in type vulnerability response
  • Honeynet architecture implementation method for cloud plug-in type vulnerability response

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0025] Such as Figure 1-3 As shown, the present invention provides a method for implementing a cloud-based plug-in vulnerability response honeynet architecture, including:

[0026] Build a cloud-based sandbox management platform to place the simulation sandbox on the cloud. The simulation sandbox simulates the latest vulnerable components through kvm, and quickly updates the simulation sandbox through the identification of vulnerable components in the network to achieve the latest 0day or nday's rapid detection and response;

[0027] A honeypot system is installed on the client side, and the system integrates a vulnerability detection engine. When a vulnerability of the component is detected, it requests the cloud sandbox management platform through the wireless networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a honeynet architecture implementation method for cloud plug-in type vulnerability response, which comprises the steps of building a cloud sandbox management platform used for placing a simulation sandbox at a cloud end, simulating a newest vulnerability component by the simulation sandbox through a kvm mode, and identifying and quickly updating the simulation sandbox through a vulnerability component in a network, so that the latest vulnerability can be quickly detected and responded. A honeypot system is installed at a user side; the system is integrated with a vulnerability detection engine; when the vulnerability of the component is detected, the cloud sandbox management platform is requested through a wireless network; the sandbox is requested to be updated; and vulnerability early warning data sent by the cloud sandbox management platform is received in real time. According to the method, the simulation sandbox is placed at the cloud end, simulates the newest vulnerability through a kvm mode, identifies and quickly updates the simulation sandbox through vulnerability components in a network, and achieves a quick detection and response mode of the newest 0day or day.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a method for implementing a cloud-based plug-in vulnerability response honeynet architecture. Background technique [0002] The honeypot in the existing technology is old and cannot adapt to the latest attack methods. The honeynet is separated from the real environment of the user and cannot respond to the vulnerabilities of various components. The existing honeypot cannot automatically update the simulation sandbox plug-in, and the existing honeypot cannot Adapting to the real assets of users, the existing honeypot information is isolated, and the sharing of threat intelligence is not timely. Contents of the invention [0003] The invention aims to overcome the deficiencies of the prior art and provide a method for implementing a cloud-based plug-in vulnerability response honeynet architecture. [0004] The technical solution of the present invention to solve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/53G06F21/57
CPCG06F21/53G06F21/577H04L63/1433H04L63/1491
Inventor 宋彦春郑昭翼胡惠
Owner 江苏天翼安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products