Network traffic processing method and device, and storage medium

A network traffic and processing method technology, which is applied in the field of devices, storage media, and network traffic processing methods, can solve the problem of low capture efficiency of trapping attack traffic, and achieve the effect of improving trapping efficiency

Pending Publication Date: 2022-05-13
SANGFOR TECH INC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the above method of statically deploying honeypot services is less efficient in trapping attack traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic processing method and device, and storage medium
  • Network traffic processing method and device, and storage medium
  • Network traffic processing method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0044] see below figure 1 , figure 1 It is a flow chart of a method for processing network traffic provided in the embodiment of the present application. This embodiment may include the following steps:

[0045] S101: Detect traffic characteristics of network traffic.

[0046] Wherein, this embodiment can be applied to security devices such as fire...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic processing method, which is applied to security equipment and comprises the following steps: detecting traffic characteristics of network traffic; wherein the traffic characteristics comprise an attack behavior detection result and / or a preset access resource; generating a corresponding target drainage strategy according to the flow characteristics; wherein the target drainage strategy comprises a honeypot corresponding to the flow feature; and redirecting the network traffic to the corresponding honeypot according to the target traffic diversion strategy. According to the invention, the trapping efficiency of the honeypot system on attack traffic can be improved. The invention also discloses a network traffic processing device and electronic equipment, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network traffic processing method, device and storage medium. Background technique [0002] A honeypot is a virtual system or network specially used to lure hackers; a honeypot can discover, save and analyze the clues left by hackers on the computer system, and track the whereabouts of hackers at any time, so as to understand the latest technologies and working ideas used by hackers. By acquiring these skills, you will gain a better understanding of the threats to your network systems and understand how to prevent them so you can gain the greatest leverage in the war against hackers. [0003] In related technologies, the honeypot service is mainly statically deployed to passively wait for an attacker's access. In the real hacker penetration process, the business points and technical aspects involved are very extensive, and the technical means and loopholes m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/1416
Inventor 刘送智
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products