Honeynet dynamic configuration strategy generation method, configuration method and storage medium
A dynamic configuration and honeynet technology, applied in the field of network security, can solve problems such as lack of intelligence and dynamics, attacker restrictions, honeynet deception, etc., and achieve the effect of improving intelligence and camouflage and deception capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Such as figure 1 , figure 2 As shown, the present embodiment provides a honeynet dynamic configuration strategy generation method, including:
[0048] S1: Construct a security knowledge graph containing honeynet dynamic configuration strategies.
[0049] Specifically, the security knowledge graph constructed by the present invention is a knowledge graph in the field of network security oriented to honeynet configuration, which involves six dimensional ontologies, namely:
[0050] G=
[0051] They are the node dimension EN, the network dimension EW, the vulnerability dimension V, the attack behavior dimension AT, the attack mode dimension AM, the honeynet policy dimension S, and the relationship set R between each dimension. Among them, the node dimension and network dimension correspond to the business and equipment in the honeypot network field. The node dimension uses the IP address as the only primary key, and also records such as deployed services, installed sof...
Embodiment 2
[0069] This embodiment provides a honeynet dynamic configuration method, including:
[0070] Adopt the honeynet dynamic configuration strategy generating method as described in embodiment 1 to generate the honeynet dynamic configuration strategy;
[0071]According to the generated honeynet dynamic configuration strategy, the honeynet and the attributes of each honeypot node in the honeynet are dynamically configured, so that the state of the honeynet can meet the current security situation requirements, so as to achieve the effect of camouflage.
[0072] Preferably, the method further includes: acquiring dynamically configured honeynet data and feeding it back to the security knowledge graph, and iteratively correcting the security knowledge graph.
Embodiment 3
[0074] This embodiment provides a computer-readable storage medium, which stores a computer program, and when the computer program is loaded by a processor, implements the honeynet dynamic configuration policy generation method as described in Embodiment 1.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


