Network attack processing method and device
The technology of a network attack and processing method is applied in the field of network attack processing system, network attack processing method, a network attack processing device, and computer-readable storage medium, which can solve the problems of low efficiency and high cost of honeypot deployment, and achieve reduction Deployment costs and the effect of improving deployment efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
[0049] In related technologies, a common honeypot deployment method is to associate the honeypot with the business system of the user's real business. Although this method can induce attackers to attack, it also interferes with the user's real business , the security risk of the user's real business is relatively high. Among them, the real business refers to video playing, chatting, shopping, etc., which can be realized through a business process (application program) running on the business system.
[0050] In view of the above problems, the embodiment of the present invention proposes a network attack processing method, which involves three modules, namely the operation module, and the isolated honeypot network and business system. It should be noted that the honeypot network and business system in th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


