Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Active trapping security defense method and system, electronic equipment and storage medium

A security defense and entrapment technology, which is applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as inconvenience and inability to effectively trap attackers, and achieve the effect of security defense

Pending Publication Date: 2022-04-05
HARBIN ANTIY TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the invention, the inventor found that: although the above-mentioned method of isolating internal and external networks for data security protection can be used to protect data such as files with a higher level of importance, it is not relatively high for the level of importance. For data such as files that need to be kept confidential, it is somewhat inconvenient to adopt the complete isolation protection method of internal and external networks; in addition, in some scenarios that need to induce attackers to attack, the isolation of internal and external networks also makes it impossible to effectively trap attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active trapping security defense method and system, electronic equipment and storage medium
  • Active trapping security defense method and system, electronic equipment and storage medium
  • Active trapping security defense method and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0056] Figure 4 It is a schematic block diagram of an embodiment of the active decoy security defense system of the present invention. see Figure 4 As shown, the system of this embodiment includes:

[0057] Listener module 210, used to monitor the decoy file on the first target host;

[0058] The triggering program module 220 is used to trigger the defense strategy of capturing the identification information of the user host and the identification information of the attacking host if it is detected that a user host executes a preset operation command on the decoy file; The user host is in the same local area network, and the user host is the controlled object of the attacking host.

[0059] The system of this embodiment can be used to execute figure 1 The implementation principles and technical effects of the technical solutions of the shown method embodiments are similar and will not be repeated here.

[0060] In some embodiments, the decoy file includes: a source data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an active trapping security defense method and system, electronic equipment and a storage medium, and relates to the technical field of terminal security. The method comprises the following steps: monitoring a bait file on a first target host; if it is monitored that a user host executes a preset operation instruction on the bait file, triggering a defense strategy for capturing identification information of the user host and identification information of an attack host; the first target host and the user host are located in the same local area network, and the user host is a controlled object of the attack host. According to the scheme, isolation of an inner net and an outer net is not needed, information of attackers can be conveniently trapped, and therefore security defense can be further achieved.

Description

technical field [0001] The present invention relates to the technical field of terminal security, in particular to an active entrapment security defense method, system, electronic equipment and storage medium. Background technique [0002] One of the tasks of network security protection is to ensure the security of electronic data and prevent it from being stolen by network attackers. With the iterative update of cyber threat means, there are always loopholes and vulnerabilities that can be exploited by cyber attackers on computers, smartphones and other electronic devices, which makes the security protection requirements for data generated or stored on electronic devices higher . [0003] Most of the existing security protection means isolate the internal (internal local area network) and external network (external wide area network) for data protection. [0004] In the process of realizing the invention, the inventor found that: although the above-mentioned method of iso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0631
Inventor 李丹韩文奇
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products