Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack induction method and device based on honeypot of Internet of Things

A network attack and Internet of Things technology, applied in the field of network attack induction based on Internet of Things honeypots, can solve the problems of incapable equipment security protection, low security protection capabilities, and low interaction degree of low-interaction honeypots, so as to enhance security protection capabilities , Improve the effect of accuracy and effectiveness

Pending Publication Date: 2022-03-08
SHENZHEN COMTOP INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, practice has shown that low-interaction honeypots have a low degree of interaction and low security protection capabilities, medium-interaction honeypots are not suitable for complex threats, and high-interaction honeypots have high security risks, so these three types of honeypots cannot deal with equipment security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack induction method and device based on honeypot of Internet of Things
  • Network attack induction method and device based on honeypot of Internet of Things
  • Network attack induction method and device based on honeypot of Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] See figure 1 , figure 1 It is a flow chart of a network attack induction method based on an objective honey tank disclosed in the embodiment of the present invention. in, figure 1 The network attack induction method based on the IoT honey tank can be applied to a network attack induction device based on an Internet of honeypot, and the embodiment of the present invention is not limited. Such as figure 1 As shown, the network attack induction method based on the Internet of honeypot can include the following operations:

[0079] 101. Construct the virtual environment of the icon honeypot.

[0080] In the embodiment of the present invention, it is optionally a virtual environment in which a virtual environment is arranged in which a virtual environment includes one or more of the virtual components, network services, and network information. Optionally, the virtual environment is an attacker's bait, which attracts attackers attack on the virtual environment. Further optional,...

Embodiment 2

[0094] See figure 2 , figure 2 It is a flow chart of a network attack induction method based on an objective honey tank disclosed in the embodiment of the present invention. in, figure 2 The network attack induction method based on the IoT honey tank can be applied to a network attack induction device based on an Internet of honeypot, and the embodiment of the present invention is not limited. Such as figure 2 As shown, the network attack induction method based on the Internet of honeypot can include the following operations:

[0095] 201, construct the virtual environment of the icon honeypot.

[0096] 202. Detect attack behavior for virtual environments.

[0097] 203. According to the attack behavior, identify the attack information, the attack information includes the target attack type corresponding to the attack behavior.

[0098] 204. Analyze the type of target attack and determine the simulation reflection information.

[0099] 205, send an analog reflection information to ...

Embodiment 3

[0142] See image 3 , image 3 It is a schematic structural diagram of a network-based attack-induced device based on an internet honey tank disclosed in the embodiment of the present invention. Such as image 3 As shown, the network attack-induced device based on the Internet of honeypot includes:

[0143] Building module 301 for constructing a virtual environment of the web honeypot.

[0144] Detection module 302 is used to detect attack behaviors for virtual environments.

[0145] Determine module 303 for determining attack information, and attack information includes target attack types corresponding to attack behavior, based on attack behavior.

[0146] Analysis module 304 for analyzing the target attack type and determines analog reflection information.

[0147] The transmission module 305 is configured to send an analog reflection information to an attacker terminal that triggered an attack behavior.

[0148] Visible, implementation image 3 The desired network attack-induced d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack induction method and device based on an Internet of Things honeypot, and the method comprises the steps: constructing a virtual environment of the Internet of Things honeypot, detecting an attack behavior for the virtual environment, determining attack information according to the attack behavior, the attack information comprising a target attack type corresponding to the attack behavior, and analyzing the target attack type, and determining simulation reaction information, and sending the simulation reaction information to the attacker terminal starting the attack behavior. Visibly, the attack information can be determined and the attack type of the attack target can be analyzed, the accuracy and effectiveness of capturing the network attack can be improved, the determined simulation reflection information can be fed back to the attacker terminal, and the security protection capability of the Internet of Things equipment for the network attack can be enhanced.

Description

Technical field [0001] The present invention relates to the field of network security techniques, and more particularly to a network attack induction method and apparatus based on an Internet of honeypot. Background technique [0002] In recent years, emerging Internet of Things (IOT) has attracted people's attention to networked equipment security. How to develop appropriate and economic effective ways to discover vulnerabilities in the Internet of Things equipment to resolve them a hot problem with network security before the attacker uses them. In traditional IT security, honeyps are commonly used to understand dynamic threat environments, not exposing key assets, and in a conventional black cap meeting, traditional honey tanker technology has been discussed multiple times. [0003] Currently, the honey tank system can be divided into low-altitude honey tankers, medium exchange mutual honey tankers, according to the interaction level. Specifically, the low interace honey tank ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G16Y30/10
CPCH04L63/1491G16Y30/10
Inventor 吴冬冬温国林隋沐衡
Owner SHENZHEN COMTOP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products