Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active decoy method and system

An active and subsystem technology, applied in the field of network security, can solve the problems of active deception, self-updating attack detection rules, incapable of real-time detection of hacker attacks, etc., to achieve the effect of improving defense capabilities

Inactive Publication Date: 2007-01-03
HUAWEI TECH CO LTD
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The present invention provides an active deception method and system to solve the problems in the prior art that hacker attacks cannot be detected in real time, active deception and self-updated attack detection rules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active decoy method and system
  • Active decoy method and system
  • Active decoy method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] see image 3 , is a schematic diagram of the structural modules of the decoy system of the present invention, including: a detection and diversion subsystem 1 , a decoy network 2 and a data analysis subsystem 3 .

[0053] Among them, the detection and diversion subsystem 1 samples the data flow sent to the target network, and matches the sampled data with the characteristic information of hacking behavior stored in the detection module (the characteristic information of hacking behavior can be stored separately in a knowledge base) , redirect the suspicious / abnormal data flow to the decoy network 2 according to the matching result, and redirect the normal data flow to the target network;

[0054] Decoy network 2 is separated from the target network, simulates the target network to process suspicious / abnormal data, and captures hacker attack behavior data in the decoy network and sends it to the data analysis subsystem 3;

[0055] The data analysis subsystem 3 analyzes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An active spoofing-method includes sampling data stream and matching sampled data with stored character information of hacker attack behavior, repositioning said data stream to spoof network for processing when matched result is decided to be doubt / abnormal data stream, catching data of attack behavior of hacker in spoof network and analyzing out new character information of hacker attack behavior then adding it into stored character information of hacker attack behavior. The spoof system for realizing said method is also disclosed.

Description

technical field [0001] The invention relates to the field of network security, in particular to an active deception method and system. Background technique [0002] The security of computer information systems and networks has always been an important issue facing the industry. In order to resist various hacker attacks from external networks, some typical security technologies and products, such as firewalls and intrusion detection systems, have been applied and deployed in existing networks. Generally speaking, the firewall is placed at the network boundary of the user service network, and plays a rough role in filtering and protecting the data traffic from the external network. Intrusion detection systems are divided into host-based and network-based. The former is deployed on hosts such as servers and workstations to protect local data and systems, while the latter is deployed at key locations on the network or on network devices. , to monitor the incoming and outgoing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00
Inventor 位继伟孙知信
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products