Honeypot protection system

A protection system and honeypot technology, applied in the computer field, can solve problems such as high probability of server being attacked, and achieve the effect of improving network security

Active Publication Date: 2021-11-05
杭州安恒信息安全技术有限公司
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, honeypots are generally used to capture the traffic of the specified port of the actual server, and there are many idle IP addresses in the service network, so the range of attackers attacking the service network is limited to the IP addresses that have been used, which leads to the attack probability of the real server relatively bigger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honeypot protection system
  • Honeypot protection system
  • Honeypot protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0026] At present, honeypots are generally used to capture the traffic of the specified port of the actual server, and there are many idle IP addresses in the service network, so the scope of the attacker's attack on the service network is limited to the used IP addresses, thus causing the real server to be attacked The probability is relatively high. Therefore, the present application provides a honeypot protection system, which can reduce the probability of a real server being att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a honeypot protection system, which uses a simulation node to simulate a real node in a protected network, and the simulation node is configured with all idle IP addresses in the protected network, so that the simulation node can be accessed externally as the real node in the protected network. Under the condition, if an attacker accesses the protected network, the attacker does not only access the real node in the protected network but possibly accesses the simulation node, but the simulation node does not run the actual network service, so that the probability that the protected network is attacked is reduced, and the probability that the real server is attacked is also reduced. Meanwhile, the honeypot group can capture the flow data of the access simulation node and the protected network, so that the attack information can be captured by the honeypot, and the network safety is protected and improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a honeypot protection system. Background technique [0002] At present, honeypots have become an important protection method for network security protection. The core of the honeypot is to simulate real asset services and mix them with real services. In addition to simulating real services, honeypots can also record attack-related information in attack responses, providing sufficient information for subsequent attack source tracing. [0003] Since the honeypot is deployed in the service network and mixed with the real service, it is a probabilistic thing for the attacker to touch the honeypot. At present, honeypots are generally used to capture the traffic of the designated port of the actual server, and there are many idle IP addresses in the service network, so the scope of the attacker's attack on the service network is limited to the IP addresses that have been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F9/455
CPCH04L63/1491G06F9/45558H04L63/0272G06F2009/45595G06F2009/45587
Inventor 褚维明李华生
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products