Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Honeypot dynamic deployment method and device thereof, electronic equipment and readable storage medium

A dynamic deployment and honeypot technology, applied in the field of network security, can solve the problems of honeypot imitation, authenticity, honeypot deployment coverage, etc., and achieve the effect of large-coverage deployment and strong imitation

Inactive Publication Date: 2022-01-07
BEIJING KNOWNSEC INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing honeypot deployment method only realizes the basic deployment of honeypots, and the effects of fake authenticity of honeypots and coverage of honeypot deployment are not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honeypot dynamic deployment method and device thereof, electronic equipment and readable storage medium
  • Honeypot dynamic deployment method and device thereof, electronic equipment and readable storage medium
  • Honeypot dynamic deployment method and device thereof, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0040] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a honeypot dynamic deployment method and a device thereof, electronic equipment and a readable storage medium, asset information in a protection area is obtained by detecting assets in the protection area, honeypot deployment is automatically carried out based on a set deployment strategy and according to the asset information, wherein each deployed honeypot is bound with a virtual IP, and the virtual IP is constructed according to the idle IP of the assets counterfeited by the honeypot in the protection area in the same network segment. According to the scheme, asset management and honeypot deployment are combined, the honeypot is deployed with asset information as the reference, the counterfeit simulation performance is higher, the IP does not need to be fixed, and honeypot IP deployment can be performed by using the idle IP in the network, so that the problem of avoiding large-range honeypot coverage due to worry about IP conflict can be avoided, and large-coverage-range deployment of the honeypot can be realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a honeypot dynamic deployment method, device, electronic equipment and readable storage medium. Background technique [0002] Honeypot is a deception defense system. It is different from traditional security monitoring products. It does not need to defend against attacks based on security rules. It is complementary to traditional security products. The current honeypot products mainly have the ability to perceive threats, contain attackers, trace the attack process and attackers, and counter attackers. However, maximum capability is required to perceive a threat in order to fully exploit its capabilities. By specifying the IP of the honeypot and the corresponding honeypot service in the intranet, the intranet can be covered to a certain extent, the threat can be perceived to a certain extent, and corresponding measures can be taken to eliminate the threat. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1491
Inventor 杨珩
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products