Safe trapping method and device and computer equipment

A computer program and equipment technology, applied in the field of security trapping methods and devices, can solve the problems of occupying large server resources and high deployment costs, and achieve the effect of saving server resources and reducing costs

Active Publication Date: 2022-06-03
烽台科技(北京)有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a security trapping method and device, which can solve the problem that the dep

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe trapping method and device and computer equipment
  • Safe trapping method and device and computer equipment
  • Safe trapping method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0027] figure 1 This is an application environment diagram of the security trapping method provided by an embodiment of the present application.

[0028] The safety trapping method provided in the embodiments of the present application can be applied to, for example, figure 1 in the application environment shown. The attacking device terminal 102 communicates with the server 104 through the network. The data storage system may store data that the server 104 needs to process. The data storage system can be integrated on the server 104, or it can be placed on the clo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application is applicable to the technical field of network security, and provides a secure trapping method, comprising: generating a plurality of categories of first simulation devices and first virtual services, the first simulation devices and the first virtual services being generated through a simulator according to device parameters of physical devices and application scenarios of the physical devices; generating shadow equipment of the entity equipment, wherein each shadow equipment corresponds to a plurality of virtual communication addresses; and when the virtual communication address receives a traffic data packet from the attack device, if the shadow device corresponding to the virtual communication address is high interaction, forwarding the traffic data packet to the corresponding first simulation device and/or the first virtual service through the shadow device. According to the method, the simulation device is generated through the simulator corresponding to the entity device, and then deployment of the industrial internet deception trapping system is achieved. And a plurality of containers do not need to be generated, so that a large amount of server resources can be saved, and the cost of deploying the industrial internet deception trapping system is reduced.

Description

technical field [0001] The present application belongs to the technical field of network security, and in particular relates to a security trapping method and device. Background technique [0002] With the transformation and upgrading of industries, the Industrial Internet has been widely used. However, there are network information security problems in the application of the Industrial Internet, such as information leakage, cyber attacks, and exploitable security loopholes. At present, it is possible to use the industrial Internet to deceive and trap systems for active defense and obtain threat intelligence. [0003] However, the existing industrial Internet deception and trapping system needs to occupy a lot of server resources during deployment, and the deployment cost is relatively high. SUMMARY OF THE INVENTION [0004] The embodiments of the present application provide a security trapping method and device, which can solve the problem that the industrial Internet d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L49/00
CPCH04L49/70H04L63/1491H04L63/1466Y02D30/50
Inventor 方永成赵重浩刘茂林龚亮华
Owner 烽台科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products