Unlock instant, AI-driven research and patent intelligence for your innovation.

Attacker portrait generation method and device and electronic equipment

An attacker and portrait technology, applied in the field of network security, can solve the problem of not being able to portray the attacker's portrait

Inactive Publication Date: 2022-02-08
北京微步在线科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing honeypot technology Honeypots only attract attack firepower, and cannot portray a complete portrait of the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attacker portrait generation method and device and electronic equipment
  • Attacker portrait generation method and device and electronic equipment
  • Attacker portrait generation method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] like figure 1 As shown, the embodiment of the present application provides a method for generating an attacker portrait, the method including:

[0063] S101: Obtain attacker information;

[0064] S102: Expand the attacker's information to obtain the expanded attacker's information;

[0065] S103: Generate an attacker portrait according to the attacker's information and the expanded attacker's information.

[0066] In the above implementation process, the attacker’s information is first obtained. The existing technology is to directly generate an attacker’s portrait based on the attacker’s information. However, the embodiment of the present application expands the attacker’s information to obtain the expanded attacker’s information. ; An attacker portrait generated based on the expanded attacker information and the previously obtained attacker information. Based on the above implementation manner, the generated attacker portrait is more complete than the attacker port...

Embodiment 2

[0068] see figure 2 , a method for generating a portrait of an attacker provided by the application, the method comprising:

[0069] S201: Obtain the first IP address of the attacker through instant messaging technology (Web Real-Time Communication, WebRTC);

[0070] In the above embodiments, WebRTC is an application programming interface that supports web browsers to conduct real-time voice conversations or video conversations. WebRTC is an extension to HTML5 that allows to get the current client's IP address.

[0071] S202: Obtain the attacker's second IP address through remote access technology;

[0072] The traditional method of obtaining the IP of website visitors is generally to directly obtain the remote access IP at the code level, or to load a third-party JS (JavaScript) file that obtains the IP to obtain the visitor's IP. There is a flaw in this method that if the attacker uses a proxy IP access to the website, the IP obtained by the above method is the proxy IP,...

Embodiment 3

[0100] see image 3 , the present application is an embodiment to provide an attacker portrait generation device, the device includes:

[0101] Obtain module 1, which is used to obtain the information of the attacker;

[0102] The extension module 2 is used to expand the attacker's information to obtain the expanded attacker's information;

[0103] A generating module 3, configured to generate an attacker portrait according to the attacker's information and the expanded attacker's information.

[0104] In the above implementation process, the acquisition module 1 first acquires the attacker's information. The existing technology directly generates the attacker's portrait according to the attacker's information, but in the embodiment of the present application, the extension module 2 expands the attacker's information to obtain an extended The attacker's information; the generation module 3 generates the attacker portrait according to the expanded attacker's information and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attacker portrait generation method and device and electronic equipment, and the method comprises the steps: obtaining the information of an attacker; expanding the information of the attacker to obtain the expanded information of the attacker; and generating an attacker portrait according to the information of the attacker and the expanded information of the attacker. According to the embodiment of the invention, more information of the attacker can be obtained, the information of the attacker is expanded, and a complete portrait of the attacker is generated.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a method, device and electronic equipment for generating an attacker portrait. Background technique [0002] As the concept of network security has entered the public eye, offensive and defensive drills have become more frequent. The difference between cyber wars and real wars is that our army is aware that the enemy is in the dark. No one in the army knows. At this time, by deploying honeypots, you can promptly and sensitively perceive whether the enemy has started to attack, where it is attacking from, where you want to attack our army, what is the attack method, what are the attack steps, and the traceability function of the honeypot It can also help to find out who the enemy's true identity is. [0003] Honeypots exist as active defense weapons. Through fast and massive deployment, they can achieve the purpose of highly emulating and protecting real asse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/1441
Inventor 贾振康吉金樊兴华薛锋
Owner 北京微步在线科技有限公司