Virtual node and honeypot combined trapping attack method, device and system

A technology of virtual nodes and honeypots, which is applied in transmission systems, digital transmission systems, secure communication devices, etc. It can solve the problems of malicious network protocol attacks, random attack behaviors of attackers, and inability to support services, so as to achieve real and trapping of virtual nodes The effective effect of the attack

Active Publication Date: 2022-05-13
北京卫达信息技术有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In network communication, the network protocol is vulnerable to malicious attacks, resulting in the failure of normal communication between devices. Nowadays, virtual modules are usually established on the device or between the device and the rout

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual node and honeypot combined trapping attack method, device and system
  • Virtual node and honeypot combined trapping attack method, device and system
  • Virtual node and honeypot combined trapping attack method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Reference Figure 1 , a trap attack system combined with a virtual node and honeypot, including: routers, switches, interception modules and multiple device terminals,

[0060] Routers are used to forward packets;

[0061] The switch is connected to the router for forwarding packets;

[0062] The interception module, set between the router and the switch, is used to modify the source address of the packets crawled by the interception module, and the source address of the packet is mainly to confuse the real packet with the virtual packet; it is used to judge the attack behavior, as well as the threat perception attack behavior and the decrypted password of the attacker to store. The interception module is set up with a trap attack device combined with a virtual node and a honeypot, including a memory and a processor, and the memory stores the judgment program of the attack behavior, the threat perception attack behavior and the judgment of the attacker's decryption password...

Embodiment 2

[0097] The difference from Example 1 is that the fake node is provided on the interception module, the interception module is provided with a honeypot, the honeypot is used to monitor the attack behavior, and the acquisition of the attacker's decryption password. This situation is more suitable for the setting of virtual nodes on the device terminal, for example, there are many PC ends distributed in different areas, because all device terminals and router connections need to go through the interception module, so all the fake nodes are set in the interception module, which facilitates the construction of the entire virtual network and the deployment of honeypots on the false nodes.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of mobile communication and Internet, and discloses a virtual node and honeypot combined trapping attack method, device and system, the virtual node and honeypot combined trapping attack method comprises the following steps: receiving an attack behavior generated on a virtual node monitored by a honeypot; judging whether the attack behavior belongs to threat perception or not by analyzing the attack behavior; if the attack behavior does not belong to threat perception, ignoring the attack behavior; and when the threatening perception is judged, calling a honeypot to simulate real equipment to make a corresponding response, and trapping an attacker to continue attacking. After the risk perception is judged, the honeypot encrypts the virtual data packet to achieve the effect of trapping an attacker, at the moment, the virtual node is mainly a carrier of the virtual data packet, the honeypot is mainly used for acquiring an attack behavior, and the virtual node and the honeypot are combined, so that the virtual node can also perform trapping response to the attacker in the process of trapping the attacker to attack, and the attack behavior can be effectively trapped. The virtual nodes are more real, and trapping attacks are more effective.

Description

Technical field [0001] A trap attack method, device and system combining virtual node and honeypot. Background [0002] In network communication, network protocols are vulnerable to malicious attacks, resulting in normal communication between devices, and now it is common to establish virtual modules on the device or between devices and routers, so that the ports attacked by attackers are transferred to virtual modules. [0003] Usually the virtual module only includes the IP address and port, and cannot carry out other support services, resulting in the attacker's attack behavior being arbitrary. Contents of the Invention [0004] In order to induce an attacker to attack a virtual module, the present application provides a trap attack method, apparatus and system combining a virtual node and a honeypot, having the characteristics of trapping an attacker to attack a virtual node by combining a honeypot and a virtual node. [0005] The object of the above invention of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/1416H04L63/0428
Inventor 张长河
Owner 北京卫达信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products