CN110071931A - Mimicry honey jar evolution method, device, equipment and computer readable storage medium - Google Patents

Mimicry honey jar evolution method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110071931A
CN110071931A CN201910355888.3A CN201910355888A CN110071931A CN 110071931 A CN110071931 A CN 110071931A CN 201910355888 A CN201910355888 A CN 201910355888A CN 110071931 A CN110071931 A CN 110071931A
Authority
CN
China
Prior art keywords
honey jar
mimicry
service
evolution
solution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910355888.3A
Other languages
Chinese (zh)
Inventor
郑杰生
刘文彬
黄洪涛
温柏坚
吴广财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Information Center of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Information Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Information Center of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN201910355888.3A priority Critical patent/CN110071931A/en
Publication of CN110071931A publication Critical patent/CN110071931A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses a kind of mimicry honey jar evolution methods, device, equipment and computer readable storage medium, mimicry service features library is established according to the network environment information and information on services of honey jar or server first, a variety of mimicry services with service features and honey jar feature are formed in mimicry service features library, then the network flow of real-time monitoring honey jar or server, when reaching evolution trigger condition, triggering is developed, the service of the TABU search based on mimicry service features library is carried out to honey jar or server to develop, optimal evolution result is exported as current mimicry service, and TABU search provided herein services and develops, due to using tabu search algorithm, input condition only needs an initial feasible solution, the population scale requirement that optimal evolution result is not limited to genetic algorithm can be obtained by the evolution of Tabu search algorithm, more Without carrying out selection cross and variation operation, operation time can be saved, is improved efficiency.

Description

Mimicry honey jar evolution method, device, equipment and computer readable storage medium
Technical field
This application involves honeynet technical field more particularly to a kind of mimicry honey jar evolution method, device, equipment and meters Calculation machine readable storage medium storing program for executing
Background technique
With the rapid development of Internet, hacker attacks event occurs again and again, the loss caused by social economy also with Day all increasings.Existing defensive measure such as firewall, intrusion detection etc. seems excessively passive so that fail to report, rate of false alarm it is very high, up to not To ideal protection effect.
Honeypot Techniques compensate for the deficiency of existing safeguard procedures, increasingly as a kind of active network defense means just The concern of people is received, basic thought is to make attacker by these networks as trap by the fragile target resource of simulation Trap reaches the attack of delay, fascination attacker to real target as target of attack, to protect really valuable money Source.But with the continuous variation of network-combination yarn, attacker comes to realise honey jar and brings great restriction to them, anti-honey Tank technology is come into being.Anti- Honeypot Techniques are a kind of Anti-Honeypots, are the attacks from attacker's angle pin to Honeypot Techniques, That is the trace that is left by certain detection method or honey jar of attacker finds the honey jar being arranged in target network, to bypass The monitoring of honey jar.And defender has investigated pseudo- Honeypot Techniques, utilizes the one of honey jar to cope with the anti-Honeypot Techniques of attacker A little features and the deliberate some clues of manufacture of behavior achieve the effect that draw back attacker with fear.A large amount of honey jar consumption is disposed in a network It is bigger to take resource, general user also can not be oneself configuration honey jar, and therefore, a normal host can disguise oneself as honey jar energy Attacker is enough drawn back with fear, to improve the safety of system.Attacker find a honey jar, the measure taken may be leave or after It is continuous, but it is a honey jar that attacker, which assert, in emotion, can be reduced to attack interests bring enthusiasm, thus normal host The honey jar that disguises oneself as is effective.
For critical defect existing for traditional honey jar " i.e. broken to fail ", due to itself being a static state, fixing not Dynamic network trap, not only deployment is difficult but also poor for the adaptivity of dynamic network, honey jar flexibility and trick property compared with Difference.By biotic population struggle against in synaposematism inspiration, be currently suggested the concept of mimicry formula honey jar, be a kind of " i.e. broken to drill The dynamic security technology of change ", it is believed that on traditional honey jar network foundation, by perception and artificial network and service content, effectively Mimicry feature construction dynamic evolution is carried out using protective coloration, warning coloration mechanism, that is, can reach fascination and inveigles the mesh of attacker , and existing mimicry honey jar evolution method is then the evolution method based on genetic algorithm, the mimicry honey jar based on genetic algorithm Although evolution method can be realized effective evolution, but its algorithm itself requires initial population scale larger (general due to existing It is required that more than 100 individuals), and selection cross and variation operation is carried out, therefore operation spends duration longer, efficiency compares It is low.
Summary of the invention
This application provides a kind of mimicry honey jar evolution method, device, equipment and computer readable storage mediums, for solving Certainly existing mimicry honey jar evolution method spends duration longer using operation existing for Genetic Algorithm Evolution, the relatively low skill of efficiency Art problem.
In view of this, the application first aspect provides a kind of mimicry honey jar evolution method, comprising the following steps:
101, according to honey jar or the network environment information and information on services of server, building has service features and honey jar special The mimicry service features library of sign;
102, the network flow for detecting presently described honey jar or the server, judges whether to reach according to the network flow To evolution trigger condition, if so, thening follow the steps 103;
103, TABU search service is carried out based on mimicry service features library to develop, export optimal evolution result and be used as and work as Preceding mimicry service.
Preferably, step 103 specifically includes:
1031, the service features and the honey jar feature are encoded according to mimicry service features library, is obtained Service features coding vector and honey jar feature coding vector;
1032, using the service features coding vector or the honey jar feature coding vector as the defeated of tabu search algorithm Enter, preset maximum number of iterations;
1033, initialization service solution, and taboo list is initialized as sky;
1034, judge whether the number of iterations reaches maximum number of iterations, if so, the current solution of output is used as optimal service Otherwise solution executes step 1035;
1035, the candidate disaggregation currently solved is generated, according to preset target function calculating target function value;
1036, it is concentrated in the candidate solution, the target function value for judging whether there is a candidate solution is greater than history The target function value of optimal solution if so, the candidate solution is updated to currently solve, and updates the history optimal solution With the taboo list, otherwise the best candidate solution that do not avoided is updated to currently solve by return step 1034, and described in update Taboo list, return step 1034.
Preferably, the objective function are as follows:
Hi(t+Th)=λ ln (Qi(t))+(1-λ)ln(Pi(t))-α
Or
Wherein, λ is empirical value, and α is the honey jar service cost factor, ThFor the period of honey jar service, QiIt is attacker in t ~t+ThPeriod, Pi was in t~t+T to the attack frequency of service ihPeriod client accesses the frequency of service i, and Δ N is that attacker exists TsAttack increment in period, β are due to other consumption such as pseudo- honey jar bring server memory, time.
Preferably, the coding mode of the service features and the honey jar feature is binary coding mode.
Preferably, the evolution trigger condition specifically:
W > FH
Wherein, w is incremental loading, FHTo attack delta threshold.
The application second aspect additionally provides a kind of mimicry honey jar evolution device, comprises the following modules:
Feature library module, for the network environment information and information on services according to honey jar or server, building has service The mimicry service features library of feature and honey jar feature;
Trigger module, for detecting the network flow of presently described honey jar or the server, according to the network flow Judge whether to reach evolution trigger condition, if so, triggering genetic module;
The genetic module develops for carrying out TABU search service based on mimicry service features library, exports optimal Evolution result is as current mimicry service.
Preferably, the genetic module specifically includes:
Coded sub-units, for being carried out according to mimicry service features library to the service features and the honey jar feature Coding, obtains service features coding vector and honey jar feature coding vector;
Subelement is inputted, for searching using the service features coding vector or the honey jar feature coding vector as taboo The input of rope algorithm, preset maximum number of iterations;
Subelement is initialized, for initializing service solution, and initializes taboo list as sky;
Iteration exports subelement, for judging whether the number of iterations reaches maximum number of iterations, if so, the current solution of output As optimal service solution, otherwise, computation subunit is triggered;
The computation subunit, for generating the candidate disaggregation currently solved, according to preset target function calculating target function Value;
Judgement updates subelement, for concentrating in the candidate solution, judges whether there is the target an of candidate solution Functional value is greater than the target function value of history optimal solution, if so, the candidate solution is updated to currently solve, and updates The history optimal solution and the taboo list trigger the iteration output subelement, otherwise, the best candidate solution that will do not avoided It is updated to currently solve, and updates the taboo list, trigger the iteration output subelement.
The application third aspect additionally provides a kind of mimicry honey jar evolution equipment, and the equipment includes processor and storage Device:
Said program code is transferred to the processor for storing program code by the memory;
The processor develops for the mimicry honey jar according to the instruction execution first aspect in said program code Method.
The application fourth aspect additionally provides a kind of computer readable storage medium, and the computer readable storage medium is used In storage program code, said program code is for executing mimicry honey jar evolution method described in first aspect.
The 5th aspect of the application additionally provides a kind of computer program product including instruction, when it runs on computers When, so that the computer executes mimicry honey jar evolution method described in first aspect.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
In the application, a kind of mimicry honey jar evolution method is provided, comprising the following steps: 101, according to honey jar or server Network environment information and information on services, construct have service features and honey jar feature mimicry service features library;102, it detects The network flow of current honey jar or server, judges whether to reach evolution trigger condition according to network flow, if so, executing step Rapid 103;103, TABU search service is carried out based on mimicry service features library to develop, export optimal evolution result as current mimicry Service.Mimicry honey jar evolution method provided by the present application is believed according to the network environment information of honey jar or server and service first Breath establishes mimicry service features library, and a variety of mimicrys clothes with service features and honey jar feature are formed in mimicry service features library Business, the then network flow of real-time monitoring honey jar or server, when reaching evolution trigger condition, triggering is developed, to honey jar or Server carries out the service of the TABU search based on mimicry service features library and develops, and exports optimal evolution result and takes as current mimicry Business, and TABU search provided herein services and develops, due to using tabu search algorithm, input condition only needs one The population rule that optimal evolution result is not limited to genetic algorithm can be obtained by the evolution of Tabu search algorithm in a initial feasible solution Mould requirement can save operation time, improve efficiency, solve existing mimicry there are no that need to carry out selection cross and variation operation Honey jar evolution method spends duration longer using operation existing for Genetic Algorithm Evolution, the relatively low technical problem of efficiency.
Meanwhile tabu search algorithm is a kind of Meta-heuristics random search algorithm, from an initial feasible solution, choosing The a series of specific direction of search is selected as souning out, selection, which is realized, allows specific target function value to change most movements, uses Taboo list is recorded and is selected to the optimization process carried out, and the direction of search of next step is instructed, and can be avoided part most Excellent, evolved structure is accurate and reliable.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of one embodiment of mimicry honey jar evolution method provided by the present application;
Fig. 2 is a kind of flow diagram of another embodiment of mimicry honey jar evolution method provided by the present application;
Fig. 3 is a kind of structural schematic diagram of one embodiment of mimicry honey jar evolution device provided by the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
In order to make it easy to understand, referring to Fig. 1, a kind of one embodiment of mimicry honey jar evolution method provided by the present application, The following steps are included:
Step 101, according to the network environment information and information on services of honey jar or server, building has service features and honey The mimicry service features library of tank feature.
It should be noted that mimicry honey jar is the protective coloration mechanism and simulation honey jar by integrated use analog service environment The warning coloration mechanism of feature carries out mimicry evolution, so as to effectively confuse and inveigle attacker, realizes network confrontation.In net In network environment, protective coloration is characterized in some parameters or information of real network environment, such as: network flow, serve port, the space IP Deng.Honey jar is by imitating these protection color characteristics in network environment, to have the function that protect honey jar, honey jar can be at this time Tool as analytical attack person's behavioural information well.Warning color characteristic is some features or behavior of honey jar, such as: honey jar Special ACK/SYN retransmission mechanism, VMware network interface card, honey jar residual clue etc..
Mimicry honey jar mechanism is mainly made of mimic, simulated object, lamb, service state and mechanism of Evolution, wherein Mimic mainly has two kinds of forms of service and honey jar, and according to the difference of ambient network environment, honey jar is quasi- in protective coloration mechanism State person, and server is then mimic in warning coloration mechanism, lamb is then attacker, and mimicry honey jar passes through protective coloration and police The switching of color mechanism is guarded against to achieve the purpose that spoofing attack person.Since honey jar deployment can take a substantial amount of time and fund, it is clear that A large amount of honey jar will not be set in network, i.e., true host number is far longer than the quantity of honey jar, in order to make honey jar be not easy by Identification can be honey jar as mimic, by imitating real system or service, itself when attack probability is lower It is hidden among real system, here it is protective coloration mechanism.And warning coloration be then when attack probability it is larger when, what system was attacked Possibility greatly increases, at this point, defender can be modeled to real system or service the i.e. pseudo- honey jar of honey jar, to draw back attack with fear Person.Service state has service features and honey jar feature two types.And mechanism of Evolution is the chief component of mimicry honey jar, When protective coloration mechanism or warning coloration mechanism failure or when the information and strategy of attacking and defending both sides change, mimicry honey jar can be real When carry out develop, i.e., service state can be switched over dynamically.
In the embodiment of the present application, it can be obtained in such a way that active is interactive with drive sweep by mimicry sensing module first Current network environment information and information on services construct mimicry service features library by way of formalization, so that being formed has clothes The various mimicry services for the feature and honey jar feature of being engaged in.
The network flow of step 102, the current honey jar of detection or server judges whether to reach evolution touching according to network flow Clockwork spring part, if so, thening follow the steps 103.
It should be noted that the value of honey jar is decoy attack person to collect the information of attacker, without being to provide Normal service, thus, honey jar, which develops, uses period trigger mechanism and flow triggering, at given periodic quantity T, when honey jar lures When deceiving threshold value H of the QoS less than setting, constantly develops, so as to constantly adapt to the variation of network, preferably pretended, allowed Attacker is difficult to penetrate.In the embodiment of the present application, the flow that is provided to legitimate user of setting server be it is stable, attacker's Attack, exploration are continually changing.Setting attack delta threshold FH, trigger is established for the incremental loading w of server, when w>FHWhen, show that pseudo- honey jar has the risk penetrated in mimicry honey jar, needs to develop.
Step 103 carries out TABU search service evolution based on mimicry service features library, exports optimal evolution result and is used as and works as Preceding mimicry service.
It should be noted that it is the evolution based on tabu search algorithm that TABU search service, which is developed, in the embodiment of the present application Mechanism, tabu search algorithm are a kind of global Stepwise optimization algorithms, from an initial feasible solution, then solution procedure is Excellent method is selected using neighborhood, recent historical search process is stored in taboo list in search process, only Preferable solution not in taboo list, is just accepted as the initial solution of next iteration, is then blocked using taboo list and is just searched The region that rope is crossed avoids detour from searching for, while absolving some excellent conditions in taboo list, and then guarantees the diversity of search, To reach global optimum.
In the embodiment of the present application, in mimicry honey jar service process, mimicry control module is by real-time detection honey jar or server Network flow judges whether to the evolution of honey jar or service according to development condition.When development condition triggers, analysis, which is developed, to be taken Be engaged in feature, determination is to carry out after the evolution of honey jar feature services or service features service develop, using tabu search algorithm into The corresponding service of row is developed, and output meets the optimal solution of termination condition, is finally carried out mimicry service corresponding with optimal solution and is completed Mimicry honey jar, which develops, to be serviced.
The mimicry honey jar evolution method provided in the embodiment of the present application is believed according to the network environment of honey jar or server first Breath and information on services establish mimicry service features library, and being formed in mimicry service features library has service features and honey jar feature A variety of mimicry services, the then network flow of real-time monitoring honey jar or server, when reaching evolution trigger condition, triggering is drilled Change, the service of the TABU search based on mimicry service features library is carried out to honey jar or server and is developed, optimal evolution result is exported and makees For current mimicry service, and TABU search provided herein services and develops, and due to using tabu search algorithm, inputs Condition only needs an initial feasible solution, and optimal evolution result can be obtained by the evolution of Tabu search algorithm and be not limited to heredity The population scale requirement of algorithm can save operation time, improve efficiency, solve there are no that need to carry out selection cross and variation operation Existing mimicry honey jar evolution method spends duration longer using operation existing for Genetic Algorithm Evolution, efficiency relatively low skill Art problem.
Meanwhile tabu search algorithm is a kind of Meta-heuristics random search algorithm, from an initial feasible solution, choosing The a series of specific direction of search is selected as souning out, selection, which is realized, allows specific target function value to change most movements, uses Taboo list is recorded and is selected to the optimization process carried out, and the direction of search of next step is instructed, and can be avoided part most Excellent, evolved structure is accurate and reliable.
In order to make it easy to understand, referring to Fig. 2, present invention also provides a kind of another implementations of mimicry honey jar evolution method Example, comprising the following steps:
Step 201, according to the network environment information and information on services of honey jar or server, building has service features and honey The mimicry service features library of tank feature.
The network flow of step 202, the current honey jar of detection or server judges whether to reach evolution touching according to network flow Clockwork spring part, if so, thening follow the steps 203 to step 208.
Step 203 encodes service features and honey jar feature according to mimicry service features library, obtains service features volume Code vector and honey jar feature coding vector.
Step 204, using service features coding vector or honey jar feature coding vector as the input of tabu search algorithm, in advance Set maximum number of iterations.
Step 205, initialization service solution, and taboo list is initialized as sky.
Step 206 judges whether the number of iterations reaches maximum number of iterations, if so, the current solution of output is used as optimal clothes Otherwise business solution executes step 207.
The candidate disaggregation that step 207, generation currently solve, according to preset target function calculating target function value.
Step 208 is concentrated in candidate solution, and the target function value for judging whether there is a candidate solution is greater than history optimal solution Target function value, if so, the candidate solution is updated to currently solve, and more new historical optimal solution and taboo list, return step 206, otherwise, the best candidate solution that do not avoided is updated to currently solve, and update taboo list, return step 206.
It should be noted that the evolution service optimization of mimicry honey jar is carried out using tabu search algorithm in the embodiment of the present application, Its detailed process can be described as:
1) input of the initial coding characteristic vector as tabu search algorithm is given;
Before being developed, first have to encode feature, it is generally the case that if service may include dry run, But in order to simplify statement, the service in the embodiment of the present application represents an operation of service, the input/output argument pair of service The object that should be determined will service in the embodiment of the present application in order to which formal definitions to be suitble to encode the feature vector of mimicry evolution Feature is described with a four-tuple:
Service=f1,f2,f3…fn={ Input, Output, Description, QoS };
Wherein, Inpu is input parameter sets, i.e. request input content and input type;Output is output parameter set It closes, i.e. response output content and output type;Description is service function description and basic description, function description: is taken Business command function parameter sets;Basic description include: service IP address, port numbers, service type, using protocol type, service Version etc.;QoS represents one group of QoS of service, the QoS of regular service generally comprises service response time, service fee, service can By property etc..
In order to simplify the complexity that service is developed, binary coding mode is used to carry out mimicry honey jar in the embodiment of the present application The feature coding of service, i.e. Service=f1,f2,f3…fnIt is equivalent to { 0,1 } set.
Current more commonly used honey jar mode is collected for honey jar feature coding, in the embodiment of the present application, analyzes its feature, It is simulated in server terminal, such as often using the ARP of virtual machine MAC to cheat based on honey jar, (common 3 class of virtual machine is compared in simulation MAC Address), delay Ping delay response, simulation Honeyd deformity IP packet respond, forge out-of-date, false service etc., component one Then feature coding set carries out binary coding for feature coding set, 1 indicates to call the honey jar feature, and 0 indicates uncomfortable With.
2) maximum number of iterations is set, initial taboo list is set as empty;Taboo list is for preventing from occurring in search process It recycles, taboo list is dimensioned to 25 by the Tabu search algorithm in the embodiment of the present application, and taboo list is usually noted nearest received 20 Secondary movement is avoided being accessed again within 20 times, and after coming 20 times, these movements are exited from taboo list, and can be weighed It is new accessed.Meanwhile to avoid output resultant error larger, maximum number of iterations is unsuitable very few, and in order to avoid the number of iterations Excessive operand increases, and efficiency reduces, and maximum number of iterations should rationally be arranged, be set as in the embodiment of the present application 50 times.
3) judge whether to meet maximum number of iterations, if so, otherwise output optimal service executes step 4);
4) the candidate disaggregation currently solved is generated, according to objective function calculating target function value;Movement is generated from current solution The approach of new explanation, tabu search algorithm, can be into from current solution using the movement rule of switch type two-by-two in the embodiment of the present application Capable all mobile composition neighborhoods, search each time are all based on the candidate disaggregation currently solved, and candidate disaggregation is the true of neighborhood Subset scans a part of neighborhood only to constitute candidate disaggregation, the mobile number of candidate disaggregation being sized to taboo list Unanimously, 20 are likewise provided as.
Honey jar service QoS is described using honey jar service features similarity Hu and feature-sensitive degree Ha.It is first in honey jar deployment Phase, feature of the selection with sensibility can be more effective to the trick performance of attacker, comparatively, make in normal access process It is higher with frequency, it is believed that these information can be more interesting for attacker, and opposite honey jar similarity will be high, because This passes through the sensitivity for using frequency as feature of certain normal service feature in perception current network service device within the unit time Spend Hu.The single feature that feature-sensitive degree Ha intuitively quantifies is to attacker's decoy capability, and attacker is to certain in the statistical unit time The scan frequency of feature.Certainly, due to the independence of attacker and uncertainty, the high feature of similarity not necessarily has very high Decoy capability, susceptibility height may not have high similarity with service.Thus, it is balanced using Cobb-Douglas utility function Characteristic similarity Hu and feature-sensitive degree Ha obtains honey jar and inveigles QoS quantitative formula, as follows:
HQoS=λ ln (Hu)+(1- λ) ln (Ha)-α;
Wherein, λ is empirical value, and α is the honey jar service cost factor.
Therefore, fitness function in honey jar evolution: QoS quantitative formula is inveigled to obtain service in evolutionary process referring to honey jar Fitness function, that is, objective function of body:
Hi(t+Th)=λ ln (Qi(t))+(1-λ)ln(Pi(t))-α;
Wherein, ThFor the period of honey jar service, QiIt is attacker in t~t+ThAttack frequency of the period to service i, Pi For in t~t+ThPeriod client accesses the frequency of service i.
Pseudo- honey jar is that server disguises oneself as honey jar, substantially or server, its purpose be not attract attack but In order to draw back attacker with fear.Pseudo- honey jar can only be more effective at attacker's scanning probe initial stage.By in detection, statistical unit time Reciprocal trick QoS as pseudo- honey jar of the server by exception or the times N of attack.Thus, the quantization of pseudo- honey jar QoS Formula are as follows:
Wherein, N is t~t+TsAttacker's access times in period, β are due in pseudo- honey jar bring server It deposits, other consumption such as time.However, server consumption is not emphasis of the present invention, β is a rough estimate value.
The fitness function that pseudo- honey jar develops: serve individual in evolutionary process is obtained referring to the quantitative formula of pseudo- honey jar QoS Fitness function:
Wherein: Δ N is attacker in TsAttack increment in period.
5) it is concentrated in candidate solution, the target function value for judging whether there is a candidate solution is greater than the target of history optimal solution The candidate solution then is updated to currently solve by functional value if so, the candidate solution meets aspiration level, and more new historical optimal solution And taboo list, return step 3), otherwise, the best candidate solution that do not avoided is updated to currently solve, and update taboo list, be returned Step 3).
Aspiration level refers under the conditions of certain specific, regardless of some movement is whether in taboo list, all receives this It is mobile, and current solution and history optimal solution are updated, meet the specified conditions of this movement.Specific aspiration level refers to, in institute Having in candidate solution, the target function value for judging whether there is a candidate solution is greater than the target function value of history optimal solution, if so, Then the candidate solution for meeting aspiration level is updated to currently solve, while more new historical optimal solution and taboo list, if it is not, then will not The best candidate solution avoided is updated to currently solve, while updating taboo list.
In the embodiment of the present application, TABU search is developed, and service is main to complete Analysis Service feature, carries out feature volume to service After code, according to honey jar to the income of attacker, design object function, and under objective function guidance, the time generated from current solution Xie Jizhong is selected, selection meets the candidate solution of aspiration level and carries out cycle-index judgement, is finally updated to last solution currently quasi- State service has the advantages that develop high-efficient and accurate and reliable.
In order to make it easy to understand, referring to Fig. 3, being wrapped present invention also provides a kind of embodiment of mimicry honey jar evolution device It includes with lower module:
Feature library module 301, for the network environment information and information on services according to honey jar or server, building has clothes The mimicry service features library for the feature and honey jar feature of being engaged in.
Trigger module 302 judges whether to reach for detecting the network flow of current honey jar or server according to network flow To evolution trigger condition, if so, triggering genetic module 303.
Genetic module 303 develops for carrying out TABU search service based on mimicry service features library, exports optimal evolution knot Fruit is as current mimicry service.
Further, genetic module 303 specifically includes:
Coded sub-units 3031 are obtained for being encoded according to mimicry service features library to service features and honey jar feature To service features coding vector and honey jar feature coding vector.
Subelement 3032 is inputted, for calculating using service features coding vector or honey jar feature coding vector as TABU search The input of method, preset maximum number of iterations.
Subelement 3033 is initialized, for initializing service solution, and initializes taboo list as sky.
Iteration exports subelement 3034, for judging whether the number of iterations reaches maximum number of iterations, if so, output is worked as Preceding solution is used as optimal service solution, otherwise, triggers computation subunit 3035.
Computation subunit 3035, for generating the candidate disaggregation currently solved, according to preset target function calculating target function Value.
Judgement updates subelement 3036, for concentrating in candidate solution, judges whether there is the objective function of a candidate solution Value is greater than the target function value of history optimal solution, if so, the candidate solution is updated to currently solve, and more new historical optimal solution and Otherwise the best candidate solution that do not avoided is updated to currently solve, and update by taboo list, triggering iteration output subelement 3034 The taboo list, triggering iteration export subelement 3034.
A kind of embodiment of mimicry honey jar evolution equipment is additionally provided in the application, which includes processor and storage Device:
Program code is transferred to processor for storing program code by memory;
Processor is used for according to quasi- in the instruction execution mimicry honey jar evolution method embodiment above-mentioned in program code State honey jar evolution method.
A kind of embodiment of computer readable storage medium is additionally provided in the application, which uses In storage program code, program code is used to execute the mimicry honey jar evolution side in mimicry honey jar evolution method embodiment above-mentioned Method.
A kind of computer program product including instruction is additionally provided in the application to be made when run on a computer Obtain the mimicry honey jar evolution method in computer execution execution mimicry honey jar evolution method embodiment above-mentioned.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, system embodiment described above is only schematical, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another device is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of system or unit Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (full name in English: Read-Only Memory, english abbreviation: ROM), random access memory (full name in English: Random Access Memory, english abbreviation: RAM), the various media that can store program code such as magnetic or disk.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of mimicry honey jar evolution method, which comprises the following steps:
101, according to honey jar or the network environment information and information on services of server, constructing has service features and honey jar feature Mimicry service features library;
102, the network flow for detecting presently described honey jar or the server, judges whether to reach and drill according to the network flow Change trigger condition, if so, thening follow the steps 103;
103, TABU search service is carried out based on mimicry service features library to develop, export optimal evolution result as current quasi- State service.
2. mimicry honey jar evolution method according to claim 1, which is characterized in that step 103 specifically includes:
1031, the service features and the honey jar feature are encoded according to mimicry service features library, is serviced Feature coding vector sum honey jar feature coding vector;
1032, using the service features coding vector or the honey jar feature coding vector as the input of tabu search algorithm, Preset maximum number of iterations;
1033, initialization service solution, and taboo list is initialized as sky;
1034, judge whether the number of iterations reaches maximum number of iterations, if so, the current solution of output is used as optimal service solution, it is no Then, step 1035 is executed;
1035, the candidate disaggregation currently solved is generated, according to preset target function calculating target function value;
1036, it is concentrated in the candidate solution, the target function value for judging whether there is a candidate solution is optimal greater than history The target function value of solution, if so, the candidate solution is updated to currently solve, and updates the history optimal solution and institute Taboo list is stated, otherwise the best candidate solution that do not avoided is updated to currently solve, and update the taboo by return step 1034 Table, return step 1034.
3. mimicry honey jar evolution method according to claim 2, which is characterized in that the objective function are as follows:
Hi(t+Th)=λ ln (Qi(t))+(1-λ)ln(Pi(t))-α
Or
Wherein, λ is empirical value, and α is the honey jar service cost factor, ThFor the period of honey jar service, QiIt is attacker in t~t+ ThPeriod, Pi was in t~t+T to the attack frequency of service ihPeriod client accesses the frequency of service i, and Δ N is attacker in TsWhen Attack increment in section, β are due to other consumption such as pseudo- honey jar bring server memory, time.
4. mimicry honey jar evolution method according to claim 2, which is characterized in that the service features and the honey jar are special The coding mode of sign is binary coding mode.
5. mimicry honey jar evolution method according to claim 1, which is characterized in that the evolution trigger condition specifically:
W > FH
Wherein, w is incremental loading, FHTo attack delta threshold.
6. a kind of mimicry honey jar evolution device, which is characterized in that comprise the following modules:
Feature library module, for the network environment information and information on services according to honey jar or server, building has service features With the mimicry service features library of honey jar feature;
Trigger module judges for detecting the network flow of presently described honey jar or the server according to the network flow Whether evolution trigger condition is reached, if so, triggering genetic module;
The genetic module develops for carrying out TABU search service based on mimicry service features library, exports optimal evolution As a result it is used as current mimicry service.
7. mimicry honey jar evolution device according to claim 6, which is characterized in that the genetic module specifically includes:
Coded sub-units, for being compiled according to mimicry service features library to the service features and the honey jar feature Code, obtains service features coding vector and honey jar feature coding vector;
Subelement is inputted, for calculating using the service features coding vector or the honey jar feature coding vector as TABU search The input of method, preset maximum number of iterations;
Subelement is initialized, for initializing service solution, and initializes taboo list as sky;
Iteration exports subelement, for judging whether the number of iterations reaches maximum number of iterations, if so, the current solution conduct of output Otherwise optimal service solution triggers computation subunit;
The computation subunit, for generating the candidate disaggregation currently solved, according to preset target function calculating target function value;
Judgement updates subelement, for concentrating in the candidate solution, judges whether there is the objective function an of candidate solution Value is greater than the target function value of history optimal solution, if so, the candidate solution is updated to currently solve, and described in update History optimal solution and the taboo list trigger the iteration output subelement and otherwise update the best candidate solution that do not avoided Currently to solve, and the taboo list is updated, triggers the iteration output subelement.
8. a kind of mimicry honey jar evolution equipment, which is characterized in that the equipment includes processor and memory:
Said program code is transferred to the processor for storing program code by the memory;
The processor is used for according to the described in any item mimicry honey jars of instruction execution claim 1-5 in said program code Evolution method.
9. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing program generation Code, said program code require the described in any item mimicry honey jar evolution methods of 1-5 for perform claim.
10. a kind of computer program product including instruction, which is characterized in that when run on a computer, so that described Computer perform claim requires the described in any item mimicry honey jar evolution methods of 1-5.
CN201910355888.3A 2019-04-29 2019-04-29 Mimicry honey jar evolution method, device, equipment and computer readable storage medium Pending CN110071931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910355888.3A CN110071931A (en) 2019-04-29 2019-04-29 Mimicry honey jar evolution method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910355888.3A CN110071931A (en) 2019-04-29 2019-04-29 Mimicry honey jar evolution method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110071931A true CN110071931A (en) 2019-07-30

Family

ID=67369523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910355888.3A Pending CN110071931A (en) 2019-04-29 2019-04-29 Mimicry honey jar evolution method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110071931A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110581844A (en) * 2019-08-21 2019-12-17 浙江大学 method of forensics in mimicry defense
CN111930483A (en) * 2020-07-22 2020-11-13 河南信大网御科技有限公司 Strategy scheduling method and device based on problem scene and mimicry construction framework
CN112491892A (en) * 2020-11-27 2021-03-12 杭州安恒信息安全技术有限公司 Network attack inducing method, device, equipment and medium
CN114070575A (en) * 2020-08-07 2022-02-18 奇安信科技集团股份有限公司 Device detection processing method, device, electronic device, storage medium, and program
US11947694B2 (en) 2021-06-29 2024-04-02 International Business Machines Corporation Dynamic virtual honeypot utilizing honey tokens and data masking
CN114070575B (en) * 2020-08-07 2024-05-28 奇安信科技集团股份有限公司 Device detection processing method, device, electronic device, storage medium, and program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128543A1 (en) * 2002-12-31 2004-07-01 International Business Machines Corporation Method and system for morphing honeypot with computer security incident correlation
CN105897517A (en) * 2016-06-20 2016-08-24 广东电网有限责任公司信息中心 Network traffic abnormality detection method based on SVM (Support Vector Machine)
CN109389181A (en) * 2018-10-30 2019-02-26 全球能源互联网研究院有限公司 The correlation rule generation method and device of power grid anomalous event
CN109657452A (en) * 2018-12-20 2019-04-19 广东电网有限责任公司 A kind of mobile application behavior dynamic credible appraisal procedure and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128543A1 (en) * 2002-12-31 2004-07-01 International Business Machines Corporation Method and system for morphing honeypot with computer security incident correlation
CN105897517A (en) * 2016-06-20 2016-08-24 广东电网有限责任公司信息中心 Network traffic abnormality detection method based on SVM (Support Vector Machine)
CN109389181A (en) * 2018-10-30 2019-02-26 全球能源互联网研究院有限公司 The correlation rule generation method and device of power grid anomalous event
CN109657452A (en) * 2018-12-20 2019-04-19 广东电网有限责任公司 A kind of mobile application behavior dynamic credible appraisal procedure and device

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
SHI LEYI,ET.AL: "《Game Theoretic Simulation on the Mimicry Honeypot》", 《WUHAN UNIVERSITY JOURNAL OF NATURAL SCIENCES》 *
刘德莉: "《基于遗传算法的拟态蜜罐系统研究》", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *
张昊等: "《基于KNN算法及禁忌搜索算法的特征选择方法在入侵检测中的应用研究》", 《电子学报》 *
张震等: "《改进粒子群联合禁忌搜索的特征选择算法》", 《通信学报》 *
石乐义等: "《基于自适应遗传算法的拟态蜜罐演化策略》", 《华中科技大学学报(自然科学版)》 *
范志超: "《基于禁忌搜索算法的特征选择研究》", 《中国优秀硕士学位论文全文数据(电子期刊)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110581844A (en) * 2019-08-21 2019-12-17 浙江大学 method of forensics in mimicry defense
CN111930483A (en) * 2020-07-22 2020-11-13 河南信大网御科技有限公司 Strategy scheduling method and device based on problem scene and mimicry construction framework
CN114070575A (en) * 2020-08-07 2022-02-18 奇安信科技集团股份有限公司 Device detection processing method, device, electronic device, storage medium, and program
CN114070575B (en) * 2020-08-07 2024-05-28 奇安信科技集团股份有限公司 Device detection processing method, device, electronic device, storage medium, and program
CN112491892A (en) * 2020-11-27 2021-03-12 杭州安恒信息安全技术有限公司 Network attack inducing method, device, equipment and medium
US11947694B2 (en) 2021-06-29 2024-04-02 International Business Machines Corporation Dynamic virtual honeypot utilizing honey tokens and data masking

Similar Documents

Publication Publication Date Title
CN110071931A (en) Mimicry honey jar evolution method, device, equipment and computer readable storage medium
CN110768987A (en) SDN-based dynamic deployment method and system for virtual honey network
Li et al. LNNLS-KH: a feature selection method for network intrusion detection
CN110300106A (en) Mobile target based on Markov time game defends decision choosing method, apparatus and system
CN111371758A (en) Network spoofing efficiency evaluation method based on dynamic Bayesian attack graph
CN110493238A (en) Defence method, device, honey pot system and honey jar management server based on honey jar
CN109714364A (en) A kind of network security defence method based on Bayes's improved model
O’Reilly et al. Adversarial genetic programming for cyber security: A rising application domain where GP matters
Guo et al. Towards comprehensive testing on the robustness of cooperative multi-agent reinforcement learning
CN106411576B (en) Attack drawing generating method based on state transition network network challenge model
Suratkar et al. An adaptive honeypot using Q-Learning with severity analyzer
CN114491541B (en) Automatic arrangement method of safe operation script based on knowledge graph path analysis
CN115580430A (en) Attack tree-pot deployment defense method and device based on deep reinforcement learning
Rajesh et al. Analysis of cyber threat detection and emulation using mitre attack framework
Deshmukh et al. Attacker behaviour profiling using stochastic ensemble of hidden markov models
Patra et al. Using online planning and acting to recover from cyberattacks on software-defined networks
Amarasinghe et al. AI based cyber threats and vulnerability detection, prevention and prediction system
Devprasad et al. Context adaptive ensemble classification mechanism with multi‐criteria decision making for network intrusion detection
Amin et al. Online cyber deception system using partially observable Monte-Carlo planning framework
CN111552717B (en) Method, device, server and storage medium for identifying disguised object
Ostaszewski et al. Immune anomaly detection enhanced with evolutionary paradigms
Standen et al. Sok: Adversarial machine learning attacks and defences in multi-agent reinforcement learning
Pogossian et al. Effective discovery of intrusion protection strategies
Pashaei et al. Honeypot intrusion detection system using an adversarial reinforcement learning for industrial control networks
CN111431865B (en) Network deep threat detection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190730

RJ01 Rejection of invention patent application after publication