An active security defense system based on centralized management and control

A security defense, centralized control technology, applied in the field of network security

Active Publication Date: 2022-06-21
NANJING LIANCHENG TECH DEV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

however, many security products that exist or are in development have not incorporated defensive deception techniques into the security strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An active security defense system based on centralized management and control
  • An active security defense system based on centralized management and control
  • An active security defense system based on centralized management and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below is a further detailed description of the present invention according to the accompanying drawings and examples:

[0026] An active security defense system based on centralized control, customized and developed for centralized control. It shows a significant improvement in performance and usability over previous honeypots. Particularly:

[0027] 1, with extraordinary flexibility. They can be in the form of any digital entity and can be placed anywhere in the corporate network environment; while attackers are able to evade some forms of decoys, they may still be trapped by others;

[0028] 2. Flexible deployment and placement, creating uncertainty that will slow down attackers and possibly even drive them away (i.e. deterrent effect);

[0029] 3. Different decoys for each attack stage can be provided for different stages in the cyber kill chain model; for example, if fake documents are distributed on social networking platforms, attackers may be misled in the del...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an active security defense system based on centralized management and control, which is characterized in that the system includes a decoy module and a monitoring module, and displays malicious activities visually; the decoy module creates, manages and deploys Decoy, and supports dynamic deployment and dynamic configuration of the decoy network; the monitoring module collects and analyzes the log data generated by the decoy module, monitors the interaction between the attacker and the decoy, and predicts and early discovers the attack activities of hackers in the enterprise network , and early warning, including four sub-modules of log collection, load balancing, front-end GUI and search engine. Through the invention, a network security defense based on deception technology is constructed, which can predict the attack of hackers and overcome the defects of traditional network security defense.

Description

technical field [0001] The invention relates to the technical fields of network security, SOC (Security operation center), active security defense, key infrastructure and deception, and in particular to a system of active security defense based on centralized management and control. Background technique [0002] Cybersecurity can be viewed as a series of asymmetric conflicts between defenders and attackers. The defender needs to be right (or safe) all the time to keep the attacker out, and the attacker only needs to be right once to be successful. This requires defenders to have a high level of security assurance on their networks, requiring a targeted risk management process. It is impossible to eliminate all security gaps when securing an enterprise network, so defenders must focus on risk minimization. One cyber risk management strategy is to find vulnerabilities in systems, assess the likelihood of those vulnerabilities occurring, and then determine the impact of those...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1001H04L41/0631H04L43/045
CPCH04L63/1491H04L41/0631H04L43/045H04L67/1001
Inventor 不公告发明人
Owner NANJING LIANCHENG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products