Intrusion detection method and system based on honeynet arrangement, and storage medium

An intrusion detection system and intrusion detection technology, applied in the field of network security, can solve problems such as ineffective defense against unknown attack methods

Inactive Publication Date: 2022-03-22
北京国腾创新科技有限公司 +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional passive security defense technologies, such as intrusion detection systems (IDS) and dynamic firewalls, can only rely on known rules to deal with attacks, and cannot effectively defend against unknown attack methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and system based on honeynet arrangement, and storage medium
  • Intrusion detection method and system based on honeynet arrangement, and storage medium
  • Intrusion detection method and system based on honeynet arrangement, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The principles and features of the present invention will be described below with reference to the accompanying drawings.

[0061] Such as figure 1 As shown, an intrusion detection method based on the embodiment of the present invention is provided, including: It is to be explained that honey network belongs to an active defense technology, and honey network is not trying to limit the access to the attacker, but The attacker interacts to identify the strategy and tools used. The vulnerability and monitoring system arranged in honeypots, attacked attackers, and recorded attack behavior, and further analyzing attackers' attack behavior and traceable attackers. The core of honey net is honeypot, honeypot can be divided into low-class honeypots, migratory honey tankers and high-level mutual honey. Low interactions and middle interactions are not a real computer system, but through the simulation of the program, it is very limited to the attacker's interaction, so it is not poss...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method based on a honeynet arrangement, a storage medium and a system, and relates to the field of network security. The method comprises the following steps: arranging and constructing a honeynet according to a topological structure of a service network, deploying the honeynet to a preset cloud environment, redirecting traffic in the service network to the honeynet in the preset cloud environment, detecting abnormal traffic in the traffic through the honeynet, constructing the honeynet based on a real network topology of the service network, the system has a real network structure, the authenticity and the cheating ability of the honeynet are remarkably improved, and interaction is carried out through the honeynet and a service attacker to identify used strategies and tools, excavate unknown rules to cope with attacks and effectively defend unknown attack modes.

Description

Technical field [0001] The present invention relates to the field of network security, and more particularly to an intrusion detection method, a storage medium, and a system based on a honey network. Background technique [0002] With the rapid development of the Internet industry, the way various network attacks are constantly changing, and network security issues have become more and more serious. In particular, in recent years, the invasion and attacks in the Internet have increased significantly, and the tools and technologies used by the attackers have also evolved. Traditional passive safety defense technology, such as intrusion detection system (IDs), and dynamic firewalls that can only rely on known rules to deal with attacks, and cannot effectively defense unknown attacks. Inventive content [0003] The technical problem to be solved by the present invention is for the shortcomings of the prior art, providing an intrusion detection method, storage medium, and system of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0213H04L41/0803H04L67/00
CPCH04L63/1416H04L63/1425H04L41/0803H04L63/1491H04L67/34H04L41/0213
Inventor 豆龙坤温嘉骏王金梅
Owner 北京国腾创新科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products