Network security system based on honeypot technology

A network and subsystem technology, applied in the field of network security, can solve problems such as inability to protect network systems, insufficient deception, complex deployment, etc., and achieve the effects of increasing attack difficulty, resisting network reconnaissance attacks, and reducing operating costs

Pending Publication Date: 2022-04-01
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing network deception defense systems based on honeypots and honeynets have defects such as insufficient deception, static nature, complex deployment and difficult maintenance.
Evolved attackers can still

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security system based on honeypot technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] refer to figure 1 As shown, a network security system based on honeypot technology includes a software-defined network control subsystem and a deception server; the software-defined network control subsystem includes a virtual network topology module and an IP randomization module; the virtual network topology module It is mainly responsible for generating the virtual network topology and distributing the flow table according to the specification of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security and protection system based on a honeypot technology. The network security and protection system comprises a software defined network control subsystem and a cheating server, the software defined network control subsystem comprises a virtual network topology module and an IP randomization module; the virtual network topology module is mainly responsible for generating a virtual network topology and distributing a flow table according to the specification of the virtual network topology; the IP randomization module is responsible for coordinating address transformation of a host and a bait node in a network; the spoofing server is responsible for making a response according to the specification of the virtual network view to spoofing the malicious scanning program. According to the method, the dynamic nature, the randomness and the uncertainty of the system are increased, so that an attacker spends more time on false resources, the attack difficulty and the attack cost of the attacker are further improved, the defense efficiency and the security of the system are effectively enhanced, and the method has the advantages that infrastructures for network system development and management are flexible and effective, the operation overhead is small, and the implementation is easy. And continuous network investigation attacks can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security system based on honeypot technology. Background technique [0002] While the Internet brings high efficiency and convenience to people, the problem of network security is also becoming more and more serious. Relevant units integrate various information systems, data resources and Internet resources into an information management platform through portal websites, and establish information channels for external customers and internal personnel, so that various information stored internally and externally can be released. For attackers, these portals become their entry point into the internal network. Most traditional network defense technologies protect network and system security through intrusion detection, firewall and other technologies, but these technologies are static. Evolutionary attackers repeatedly analyze and infiltrate the target's vulnera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
Inventor 关泽武杨航刘家豪蒙家晓樊凯黄国柱刘欣陈锋付志博黄劲斌谢铭戴涛赖博宇李攀登徐培明张宇南徐传懋杨祎巍陈霖匡晓云
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products