Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud-based plug-in vulnerability response honeynet architecture implementation method

An implementation method and plug-in technology, applied in electrical components, instruments, computing, etc., can solve the problems of honeypot information isolation, honeynet detachment, honeypot oldness, etc., and achieve the effect of protecting response time

Active Publication Date: 2021-08-24
江苏天翼安全技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The honeypot in the existing technology is old and cannot adapt to the latest attack methods. The honeynet is separated from the real environment of the user and cannot respond to the vulnerabilities of various components. The existing honeypot cannot automatically update the simulation sandbox plug-in, and the existing honeypot cannot Adapt to the real assets of users, the existing honeypot information is isolated, and the sharing of threat intelligence is not timely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud-based plug-in vulnerability response honeynet architecture implementation method
  • A cloud-based plug-in vulnerability response honeynet architecture implementation method
  • A cloud-based plug-in vulnerability response honeynet architecture implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0025] Such as Figure 1-3 As shown, the present invention provides a method for implementing a cloud-based plug-in vulnerability response honeynet architecture, including:

[0026] Build a cloud-based sandbox management platform to place the simulation sandbox on the cloud. The simulation sandbox simulates the latest vulnerable components through kvm, and quickly updates the simulation sandbox through the identification of vulnerable components in the network to achieve the latest 0day or nday's rapid detection and response;

[0027] A honeypot system is installed on the client side, and the system integrates a vulnerability detection engine. When a vulnerability of the component is detected, it requests the cloud sandbox management platform through the wireless networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a honeynet architecture implementation method for cloud-based plug-in vulnerability response, including building a cloud-based sandbox management platform for placing the simulation sandbox in the cloud, and the simulation sandbox simulates the latest vulnerability components through kvm , through the identification of vulnerable components in the network, the simulation sandbox is quickly updated to achieve rapid detection and response of the latest vulnerabilities; a honeypot system is installed on the client side, and the system integrates a vulnerability detection engine. When the component vulnerability is detected, it passes The wireless network requests the cloud sandbox management platform to update the sandbox, and receives the vulnerability warning data sent by the cloud sandbox management platform in real time. This method puts the simulation sandbox on the cloud, and the simulation sandbox simulates the latest vulnerabilities through kvm, identifies the vulnerable components in the network, and quickly updates the simulation sandbox to achieve the latest 0day or nday rapid detection and response methods.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a method for implementing a cloud-based plug-in vulnerability response honeynet architecture. Background technique [0002] The honeypot in the existing technology is old and cannot adapt to the latest attack methods. The honeynet is separated from the real environment of the user and cannot respond to the vulnerabilities of various components. The existing honeypot cannot automatically update the simulation sandbox plug-in, and the existing honeypot cannot Adapting to the real assets of users, the existing honeypot information is isolated, and the sharing of threat intelligence is not timely. Contents of the invention [0003] The invention aims to overcome the deficiencies of the prior art and provide a method for implementing a cloud-based plug-in vulnerability response honeynet architecture. [0004] The technical solution of the present invention to solve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/53G06F21/57
CPCG06F21/53G06F21/577H04L63/1433H04L63/1491
Inventor 宋彦春郑昭翼胡惠
Owner 江苏天翼安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products