Unlock instant, AI-driven research and patent intelligence for your innovation.

Honey needle and honey pot device and deployment method thereof

A honeypot and honey needle technology, applied in the field of computer network security, can solve the problems of occupying large resources, inability to flexibly open ports for different services, and complex deployment, so as to reduce risks.

Pending Publication Date: 2022-07-15
南京经纬信安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology mainly relies on directly deploying honeypots in the live network, or directly forwarding the deployed probes to the corresponding honeypots, but there are mainly the following problems: 1. If the honeypots directly deployed in the live network need to occupy A large number of resources, high cost, and complex deployment; 2. If the honeypot is directly deployed on the live network, it is limited by the type of honeypot and cannot flexibly open ports for different services; 3. The honeypot deployed in the actual business network Honeypots, even with various defensive measures, will directly break through to the existing network once exploited by attackers; 4. Limited by the hardware structure of a single device, honeypots cannot be deployed in all areas of the unit network;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Honey needle and honey pot device and deployment method thereof
  • Honey needle and honey pot device and deployment method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0018] see figure 1 , the composition structure of a honey needle and a honeypot device of the present invention is given, which includes several honey needles 1 deployed in the business network and receiving attack access, and several honeypots 2 that are isolated from the business network and form a network topology. , a traffic forwarder 3 for bridging the honey needle 1 and the honeypot 2, and a honeypot controller 4 connected to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a honey needle and honey pot device and a deployment method thereof. The system comprises a plurality of honey needles which are deployed in a service network and receive attack access, a plurality of honey pots which are isolated from the service network and form a network topology, a flow transponder which is used for bridging the honey needles and the honey pots, and a honey pot controller which is connected to the flow transponder and is used for configuring a flow forwarding rule and creating and deploying the honey pots, the honeypot is isolated from the service network and forms a network topology, so that the safety is higher, the honeypot only needs to forward to a specific port during forwarding and then is distributed by the flow transponder, and the forwarding exposure surface is reduced; in addition, the data packet between the honey needle and the traffic transponder belongs to encrypted traffic, so that the risk of packet capture in the middle is reduced.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a honey needle and honey pot device and a deployment method thereof. Background technique [0002] Honeypot technology is essentially a technology to deceive the attacker. By arranging some hosts, network services or information as bait to induce the attacker to attack them, the attack behavior can be captured and analyzed to understand the attack. The tools and methods used by the defender, inferring the intention and motivation of the attack, can allow the defender to clearly understand the security threats they face, and enhance the security protection capability of the actual system through technical and management means. [0003] The existing technology mainly relies on deploying the honeypot directly in the existing network, or directly forwarding the deployed probes to the corresponding honeypot, but there are mainly the following problems: 1. If the honeypot direc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/1416
Inventor 李春强丘国伟郑华梅
Owner 南京经纬信安科技有限公司