The present invention discloses a
vulnerability simulation overload
honeypot method which comprises a host computer, a port scanning deception simulating module, a
vulnerability scanning deception simulating module, a
vulnerability scanning deception simulating module, a vulnerability attach deception simulating module, a data auditing module and a vulnerability utilizing module. When the attach sequence arrives at the simulated
honeypot, a simulated
honeypot system is used for
processing according to the situation. When an attacker executes
vulnerability scanning to the virtual host computer, the simulated honeypot responds and processes according to the vulnerability configuration information. Afterwards, these vulnerabilities are used for further attacking. Hereon, the simulated honeypot
system transmits the vulnerability
attack data flow to a vulnerability honeypot
system. The vulnerability utilization attach of the attacker is processed and responded by a vulnerability
attack simulating module. Finally, when the attacker successfully obtains the
control power through the vulnerability
attack, the attack data hereon is transmitted to a physical honeypot module. All attack processes and related data are recorded by a data auditing module for analyzing comprehensively. The method reduces the number of hardware devices in the honeynet and reduces the cost.