Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack processing method and device

The technology of a network attack and processing method is applied in the field of network attack processing system, network attack processing method, a network attack processing device, and computer-readable storage medium, which can solve the problems of low efficiency and high cost of honeypot deployment, and achieve reduction Deployment costs and the effect of improving deployment efficiency

Active Publication Date: 2021-11-19
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to increase the probability of an attacker attacking a honeypot, a dedicated developer needs to prepare multiple honeypots and then deploy them on the server. In this traditional honeypot deployment method, the number of honeypots may increase over time. And increase, not only the cost is very high, but also the efficiency of honeypot deployment is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack processing method and device
  • Network attack processing method and device
  • Network attack processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0049] In related technologies, a common honeypot deployment method is to associate the honeypot with the business system of the user's real business. Although this method can induce attackers to attack, it also interferes with the user's real business , the security risk of the user's real business is relatively high. Among them, the real business refers to video playing, chatting, shopping, etc., which can be realized through a business process (application program) running on the business system.

[0050] In view of the above problems, the embodiment of the present invention proposes a network attack processing method, which involves three modules, namely the operation module, and the isolated honeypot network and business system. It should be noted that the honeypot network and business system in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a network attack processing method and device, wherein the device comprises a honeypot network and a service system which are isolated from each other, and the method comprises the steps of receiving a honeypot deployment strategy which comprises a monitoring port and a monitoring mode, wherein the honeypot deployment strategy is generated by service operation information of a service process operated on the service system; and monitoring an attack request by a honeypot process deployed on the service system through the monitoring port, and processing the attack request according to the monitoring mode or forwarding the attack request to the honeypot network for processing. According to the embodiment of the invention, the honeypot deployment strategy is automatically generated through the service operation information of the service system, so that the service system can deploy the honeypot process based on the honeypot deployment strategy, the honeypot deployment efficiency is improved, and since the honeypot process can forward the monitored request to the honeypot network for processing according to the monitoring mode, a honeypot does not need to be deployed in the service system, and the honeypot deployment cost is reduced.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, relate to a network attack processing method, a network attack processing device, a network attack processing system, an electronic device, and a computer-readable storage medium. Background technique [0002] A honeypot is a system that arranges some hosts, network services or information as bait to lure attackers to attack, and then captures and analyzes the attack behavior of the attacker (hacker) to understand the tools and methods used by the attacker , inferring attack intentions and motives, allowing defenders to clearly understand the security threats they face, and correspondingly enhance security protection capabilities or give timely warnings. Among them, a network formed based on multiple honeypots is called a honeypot network. [0003] In order to increase the probability of an attacker attacking a honeypot, a dedicated devel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491H04L63/02
Inventor 翁迟迟
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD