CN113810423A - Industrial control honey pot - Google Patents

Industrial control honey pot Download PDF

Info

Publication number
CN113810423A
CN113810423A CN202111105295.5A CN202111105295A CN113810423A CN 113810423 A CN113810423 A CN 113810423A CN 202111105295 A CN202111105295 A CN 202111105295A CN 113810423 A CN113810423 A CN 113810423A
Authority
CN
China
Prior art keywords
honeypot
network
data
terminal
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111105295.5A
Other languages
Chinese (zh)
Inventor
戴晋
徐浩然
张金山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongneng Integrated Smart Energy Technology Co Ltd
Original Assignee
Zhongneng Integrated Smart Energy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongneng Integrated Smart Energy Technology Co Ltd filed Critical Zhongneng Integrated Smart Energy Technology Co Ltd
Priority to CN202111105295.5A priority Critical patent/CN113810423A/en
Publication of CN113810423A publication Critical patent/CN113810423A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an industrial control honeypot, which comprises a honeypot, a terminal collector, a honeypot data center and a terminal flow analysis alarm module, wherein the honeypot is connected with the terminal collector; and (4) honeypot: the simulation industrial control equipment is used for puzzling attackers or collecting attack behaviors of the attackers; a terminal collector: the system is arranged at a network outlet and used for collecting the flow data of the whole network; honeypot data center: collecting, screening, analyzing and studying collected whole network flow data, and confirming threat data; big data computing center: summarizing and analyzing all attack behaviors, extracting alarm rules and storing the alarm rules into an alarm rule base; the terminal flow analysis alarm module: and alarming and blocking all subsequent attack behaviors with the same characteristics by utilizing the alarm rule of the attack behaviors.

Description

Industrial control honey pot
Technical Field
The application relates to the field of industrial control network security, in particular to an industrial control honey pot.
Background
Currently, with the development of internet technology, network scanning, the spread of worms and virus codes, and malicious attack by hackers, etc. are risks that every host on a network may encounter at any time. In order to cope with the above-mentioned risks, anti-virus software and firewall technologies have been developed, but they are passive. The introduction of honeypot and honeynet technologies has formally resulted in an active outright to investigate these security threats on the network. However, a large number of attacks exist on the internet at present, which directly affect the security of the industrial control system, and the security situation of the industrial control system is more and more serious. In order to enhance the security of industrial control networks, many researchers have adopted honeypot technology to protect systems. The honeypot is a artificially established fake device, is not in the service logic, and can be discovered and attacked by the network. The honeypot as an active defense technology can attract attacks, analyze the attacks, speculate the attack intentions and supplement the results to threat blocking technologies such as firewalls, IDSs, IPSs and the like.
The honey net is a new concept developed gradually on the honey pot technology and can become a trapping network. One honeynet usually contains one or more honeypots, and honeypot technology is also a research type of high-interaction honeypot technology. Its main purpose is to collect attack information of hackers. However, the difference with the traditional honeypot technology is that the honeypot constitutes a hacker trapping network architecture, in which one or more honeypots can be included, while ensuring high controllability of the network, and providing various tools to facilitate acquisition and analysis of attack information.
Honeypots refer to baits deployed on a network that can masquerade as real networks, hosts and services, entice malicious attacks, and have the value of collecting information about attack activities on the network and monitoring, detecting and analyzing the information.
The honeynet system is used for collecting attack information of an intruder, and therefore, how to send out a network alarm and how to make real-time protection is an important component of the honeynet system.
Honeynets are an architecture, not a product (e.g., computer software), that is, consisting of one or more honeypots. Honeypots are a common tool that can trick attackers into the network, analyze the relevant information of the network data source, and obtain the login condition of the intruders. Typically, a honeynet has no production value, but rather, it has the value of detecting whether information system resources are unauthorized and illegal to use. Any data entering or leaving a honeypot may be considered a probe, attack or compromise. By learning how to trick an attacker into the network, an administrator can learn these knowledge to enhance the defense of his network and close the relevant vulnerabilities in the actual network.
The honey net is generally composed of one or more honeypot system architectures. The system may contain multiple similar or different databases, servers, web servers, routers, or printers. Furthermore, in this architecture, the network system is designed to allow hackers to interact with each other, monitoring all activities that occur.
In general, data control primarily contains the relevant activities and helps to reduce the risk of hackers using the honeynet to attack non-honeynet systems. The data control requirement gives hackers the freedom to enter and restrict their activities, and when hackers gain more freedom, hackers can bypass the data control and harm the system of the non-honeynet, thereby adding risk to the system. However, as more activities are restricted, it becomes more difficult to understand how hackers penetrate the organization's intranet. To successfully deploy an implementation, embodiments utilizing multiple levels of data control are utilized, including but not limited to these, such as: outbound connections, intrusion prevention gateways or broadband restrictions, etc., in combination with several different mechanisms, may help prevent a single point of failure, especially in dealing with new or unknown attacks. The honeynet project is also disclosed and suggested to operate in a closed experimental environment. Of course, if there is a failure of any mechanism (e.g., a process crashes, a hard drive is full, or a rule is misconfigured), the architecture of the honeynet may prevent all outbound activities.
In recent years, with the severe situation of industrial control safety, honeypot technology is increasingly applied to the field of industrial control, starting from simulation of protocols to simulation of industrial control environment, the interaction capacity is higher and higher, and the structure is more and more complex. In the open-source industrial control honeypot, simulation is mainly performed on industrial control protocols such as modbus, s7, IEC-104, DNP3 and the like. The conpot and the snap7 are relatively mature honeypot representatives, the conpot realizes simulation of protocols such as s7comm, modbus, bacnet and HTTP, the low-interaction honeypot is simple in deployment, protocol content is convenient to expand, and equipment information is configured in an xml form and is convenient to modify and maintain. Snap7 is a honeypot specific to Siemens PLC, and basically implements the s7comm protocol stack. The PLC simulation system can simulate the information and the state of actual equipment and realize the interaction of common PLC operation. However, these mainstream virtual honeypots can only simulate a single industrial control protocol, and therefore can only capture attack data of the single industrial control protocol.
CN102882884B provides a risk early warning system and method based on honey net in informatization production environment, which has at least one network analyzer. When the honeypot is attacked, the honeypot can inform the attacking client of the honeypot so that the client can take appropriate measures. In addition, the attacked honeypots can also inform other honeynets of the attack.
CN112953882A provides a developments honeypot defense system and defense method thereof, including the terminal body, the terminal body has signal detection, the identification module through signal connection, signal detection, the identification module is connected with the early warning respectively through the signal, alarm module and receiving module, the early warning, alarm module has information collection module through signal connection, information collection module has dynamic address random combination module through signal connection, dynamic address random combination module has false information spoofing module through signal connection, false information spoofing module has information source investigation module through signal connection, information source investigation module has information storage module through signal connection, information collection module is connected with information storage module through the signal. The dynamic honeypot defense system and the defense method thereof can randomly generate a false IP address when an intruder accesses the correct IP address.
The prior art has the following defects:
in conclusion, the existing honeypots are large in size and high in deployment difficulty; the existing honeypot itself can be broken into a springboard machine for attacking other assets, and safety risks are generated; the existing honeypot has limited capturing capability, can only identify the interaction between an attacker and the honeypot, is difficult to accurately identify the attack behavior, and further cannot extract all the behaviors of the attacker.
Disclosure of Invention
The invention provides an industrial control honeypot, which comprises:
the system comprises a honeypot, a terminal collector, a honeypot data center, a big data computing center, an alarm rule base and a terminal flow analysis alarm module;
the honeypot is connected with the terminal collector, the terminal collector is connected with the honeypot data center and the terminal flow analysis alarm module, the honeypot data center is connected with the big data calculation center, the big data calculation center is connected with the alarm rule base, and the alarm rule base is connected with the terminal flow analysis alarm module;
and (4) honeypot: the simulation industrial control equipment is used for puzzling attackers or collecting attack behaviors of the attackers;
a terminal collector: the system is arranged at a network outlet and used for collecting the flow data of the whole network;
honeypot data center: collecting, screening, analyzing and studying collected whole network flow data, and confirming threat data;
big data computing center: summarizing and analyzing all attack behaviors, extracting alarm rules and storing the alarm rules into an alarm rule base;
the terminal flow analysis alarm module: and alarming and blocking all subsequent attack behaviors with the same characteristics by utilizing the alarm rule of the attack behaviors.
Preferably, the honeypot further comprises:
a raspberry pie; the raspberry group is arranged between the honeypot and the terminal collector and is a hardware platform which is arranged for the honeypot and used for isolating the network card.
Preferably, the honeypot further comprises: an independent encrypted communication network; the independent encryption communication network is arranged between the terminal collector and the honeypot data center and is an independently established encryption transmission network independent of the Internet.
Preferably, the honeypot further comprises: a situation awareness computing center; and the situation awareness computing center is connected with the terminal collector and the big data computing center, and is used for obtaining evidence of network behaviors before and after the attack behavior discovered by the honeypot and acquiring all behaviors of an attacker from entering the network.
Preferably, the raspberry pi is based on miniaturized device deployment and multi-drop deployment.
Preferably, the raspberry pi adopts a dual network card design on hardware.
Preferably, the terminal collector is a flow copying and forwarding device, and receives the honeypot alarm and the log.
Preferably, the honeypot data center further comprises: and informing a network administrator of timely carrying out attack blocking on the really existing attack behaviors.
Preferably, the big data computing center judges an attack target, an attack path and a specific attack means from the whole industry level according to the history and real-time data of all behaviors of an attacker starting from entering the network.
Preferably, the terminal traffic analysis alarm module alarms and blocks similar attacks by utilizing industry coverage.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
and rapid multipoint deployment is carried out to form a honeypot network, the captured attack extracts all behaviors of the attacker through flow backtracking, the behaviors are summarized into rules and are sent to a terminal flow analysis alarm module, and the whole industry immunity is captured at one time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of an industrial control honeypot structure provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Example 1:
as shown in fig. 1, the industrial control honey pot provided in the embodiment of the present application includes:
the system comprises a honeypot, a raspberry group, a terminal collector, an independent encryption communication network, a honeypot data center, a situation awareness computing center, a big data computing center, an alarm rule base and a terminal flow analysis alarm module;
the honeypot is connected with the raspberry pie, the raspberry pie is connected with the terminal collector, the terminal collector is connected with the independent encryption communication network, the terminal flow analysis alarm module and the situation perception calculation center, the independent encryption communication network is connected with the honeypot data center, the honeypot data center is connected with the big data calculation center, the big data calculation center is connected with the alarm rule base and the situation perception calculation center, and the alarm rule base is connected with the terminal flow analysis alarm module;
the honeypot comprises the following steps: the simulation industrial control equipment is used for puzzling attackers or collecting attack behaviors of the attackers;
the raspberry pie comprises: a hardware platform which is deployed in the honeypot and used for isolating the network card;
the terminal collector comprises: the system is arranged at a network outlet and used for collecting the flow data of the whole network;
the independent encrypted communication network: an independently established encryption transmission network independent of the Internet ensures the safety and reliability of data;
the honeypot data center: collecting, screening, analyzing and studying collected whole network flow data, and confirming threat data;
the situation awareness computing center: forensics is carried out on network behaviors before and after the attack behavior discovered by the honeypot, and all behaviors of an attacker starting from entering the network are obtained;
the big data computing center: summarizing and analyzing all attack behaviors, extracting alarm rules and storing the alarm rules into an alarm rule base;
the alarm rule base comprises: storing an attack behavior alarm rule;
the terminal flow analysis alarm module: and alarming and blocking all subsequent attack behaviors with the same characteristics by utilizing the alarm rules of the attack behaviors, so as to realize one-time capture of the whole-industry immunity.
In some embodiments, the raspberry pi is based on miniaturized device deployments and multi-drop deployments, enabling fast, massive, multi-drop deployments; the raspberry group adopts the design of two network cards on hardware, keeps apart the network card, guarantees that even the honeypot falls down also can't be used as springboard attack safety control district.
Specifically, in some embodiments, the terminal collector is specifically a traffic replication and forwarding device, and receives honeypot alarms and logs.
According to the above scheme, the honeypot data center further comprises: and informing a network administrator of timely carrying out attack blocking on the really existing attack behaviors.
Preferably, the big data computing center judges an attack target, an attack path and a specific attack means from the whole industry level according to the history and real-time data of all behaviors of an attacker starting from entering the network.
The terminal traffic analysis alarm module alarms and blocks similar attacks by utilizing industry coverage.
Existing honeypots themselves may be breached into jumpers for attacking other assets, creating a security risk. Strict isolation is done to the network to this honeypot is inside, and data are all transmitted through independent encryption network, and even the honeypot itself sinks also can't regard as the springboard, and the security can be guaranteed.
The existing honeypot has limited capturing capability, can only identify the interaction between an attacker and the honeypot, is difficult to accurately identify the attack behavior, and further cannot extract all the behaviors of the attacker. The honeypot in the application is matched with a full-flow capturing technology to restore and study the flow before and after the attack, and the whole process of the attack of an attacker can be reproduced. If an attacker attacks other assets before or after attacking the honeypot, the traditional honeypot cannot discover the behavior of the attacker, and the honeypot in the application can discover similar behaviors to avoid the attack behavior being ignored.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Moreover, a computer may be embedded in another device, e.g., a mobile telephone, a Personal Digital Assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device such as a Universal Serial Bus (USB) flash drive, to name a few.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. An industrial honeypot, the honeypot comprising:
the system comprises a honeypot, a terminal collector, a honeypot data center, a big data computing center, an alarm rule base and a terminal flow analysis alarm module;
the honeypot is connected with the terminal collector, the terminal collector is connected with the honeypot data center and the terminal flow analysis alarm module, the honeypot data center is connected with the big data calculation center, the big data calculation center is connected with the alarm rule base, and the alarm rule base is connected with the terminal flow analysis alarm module;
the honeypot comprises the following steps: the simulation industrial control equipment is used for puzzling attackers or collecting attack behaviors of the attackers;
the terminal collector comprises: the system is arranged at a network outlet and used for collecting the flow data of the whole network;
the honeypot data center: collecting, screening, analyzing and studying collected whole network flow data, and confirming threat data;
the big data computing center: summarizing and analyzing all attack behaviors, extracting alarm rules and storing the alarm rules into an alarm rule base;
the terminal flow analysis alarm module: and alarming and blocking all subsequent attack behaviors with the same characteristics by utilizing the alarm rule of the attack behaviors.
2. The industrial honeypot of claim 1 further comprising:
a raspberry pie; the raspberry group is arranged between the honeypot and the terminal collector and is a hardware platform which is arranged for the honeypot and used for isolating the network card.
3. The industrial honeypot of claim 1 further comprising: an independent encrypted communication network; the independent encryption communication network is arranged between the terminal collector and the honeypot data center and is an independently established encryption transmission network independent of the internet.
4. The industrial honeypot of claim 1 further comprising: a situation awareness computing center; the situation awareness computing center is connected with the terminal collector and the big data computing center, forensics is conducted on network behaviors before and after the attack behaviors discovered by the honeypots, and all behaviors of an attacker starting to enter the network are obtained.
5. The industrial honeypot of claim 2, wherein the raspberry pi is based on miniaturized device deployments and multi-drop deployments.
6. The industrial honeypot of claim 5, wherein the raspberry pi is in a dual network card design in hardware.
7. Industrial honeypot as claimed in claim 1 wherein the terminal collector is specifically a traffic replication, forwarding device that receives honeypot alarms and logs.
8. The industrial honeypot of claim 1 wherein the honeypot data center further comprises: and informing a network administrator of timely carrying out attack blocking on the really existing attack behaviors.
9. The industrial honeypot of claim 1 in which the big data computing center determines attack targets, attack paths and specific attack means from an industry-wide level based on historical and real-time data of all actions of attackers since they enter the network.
10. The industrial honeypot of claim 9 in which the terminal traffic analysis alarm module uses industry coverage to alarm and block homogeneous attacks.
CN202111105295.5A 2021-09-22 2021-09-22 Industrial control honey pot Pending CN113810423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111105295.5A CN113810423A (en) 2021-09-22 2021-09-22 Industrial control honey pot

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111105295.5A CN113810423A (en) 2021-09-22 2021-09-22 Industrial control honey pot

Publications (1)

Publication Number Publication Date
CN113810423A true CN113810423A (en) 2021-12-17

Family

ID=78939931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111105295.5A Pending CN113810423A (en) 2021-09-22 2021-09-22 Industrial control honey pot

Country Status (1)

Country Link
CN (1) CN113810423A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022054A (en) * 2022-06-09 2022-09-06 安天科技集团股份有限公司 Network attack springboard importance evaluation method, system, electronic device and storage medium
CN116502226A (en) * 2023-06-27 2023-07-28 浙江大学 Firmware simulation-based high-interaction Internet of things honeypot deployment method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
CN106534146A (en) * 2016-11-28 2017-03-22 北京天行网安信息技术有限责任公司 Safety monitoring system and method
CN107070929A (en) * 2017-04-20 2017-08-18 中国电子技术标准化研究院 A kind of industry control network honey pot system
CN108259472A (en) * 2017-12-28 2018-07-06 广州锦行网络科技有限公司 Dynamic joint defence mechanism based on attack analysis realizes system and method
CN111181998A (en) * 2020-01-09 2020-05-19 南京邮电大学 Design method of honeypot capture system for terminal equipment of Internet of things
CN112202738A (en) * 2020-09-21 2021-01-08 北方工业大学 Industrial control situation sensing system and method based on machine learning
CN112383538A (en) * 2020-11-11 2021-02-19 西安热工研究院有限公司 Hybrid high-interaction industrial honeypot system and method
CN112788008A (en) * 2020-12-30 2021-05-11 上海磐御网络科技有限公司 Network security dynamic defense system and method based on big data
CN112822198A (en) * 2021-01-15 2021-05-18 中国电子科技集团公司第十五研究所 Multi-layer protocol network beacon implantation detection method for tracing application

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
CN106534146A (en) * 2016-11-28 2017-03-22 北京天行网安信息技术有限责任公司 Safety monitoring system and method
CN107070929A (en) * 2017-04-20 2017-08-18 中国电子技术标准化研究院 A kind of industry control network honey pot system
CN108259472A (en) * 2017-12-28 2018-07-06 广州锦行网络科技有限公司 Dynamic joint defence mechanism based on attack analysis realizes system and method
CN111181998A (en) * 2020-01-09 2020-05-19 南京邮电大学 Design method of honeypot capture system for terminal equipment of Internet of things
CN112202738A (en) * 2020-09-21 2021-01-08 北方工业大学 Industrial control situation sensing system and method based on machine learning
CN112383538A (en) * 2020-11-11 2021-02-19 西安热工研究院有限公司 Hybrid high-interaction industrial honeypot system and method
CN112788008A (en) * 2020-12-30 2021-05-11 上海磐御网络科技有限公司 Network security dynamic defense system and method based on big data
CN112822198A (en) * 2021-01-15 2021-05-18 中国电子科技集团公司第十五研究所 Multi-layer protocol network beacon implantation detection method for tracing application

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022054A (en) * 2022-06-09 2022-09-06 安天科技集团股份有限公司 Network attack springboard importance evaluation method, system, electronic device and storage medium
CN115022054B (en) * 2022-06-09 2024-04-30 安天科技集团股份有限公司 Network attack springboard importance assessment method, system, electronic equipment and storage medium
CN116502226A (en) * 2023-06-27 2023-07-28 浙江大学 Firmware simulation-based high-interaction Internet of things honeypot deployment method and system
CN116502226B (en) * 2023-06-27 2023-09-08 浙江大学 Firmware simulation-based high-interaction Internet of things honeypot deployment method and system

Similar Documents

Publication Publication Date Title
Stiawan et al. Investigating brute force attack patterns in IoT network
US10855700B1 (en) Post-intrusion detection of cyber-attacks during lateral movement within networks
Mairh et al. Honeypot in network security: a survey
Ho et al. Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
Cazorla et al. Cyber stealth attacks in critical information infrastructures
Koziol Intrusion detection with Snort
Tsikerdekis et al. Approaches for preventing honeypot detection and compromise
Cheema et al. Prevention techniques against distributed denial of service attacks in heterogeneous networks: A systematic review
Mukhopadhyay et al. A comparative study of related technologies of intrusion detection & prevention systems
Kaur et al. Comparison of network security tools-firewall, intrusion detection system and Honeypot
CN113810423A (en) Industrial control honey pot
US10630708B2 (en) Embedded device and method of processing network communication data
Banerjee et al. Network traffic analysis based iot botnet detection using honeynet data applying classification techniques
Kim et al. Agent-based honeynet framework for protecting servers in campus networks
Amal et al. H-DOCTOR: Honeypot based firewall tuning for attack prevention
JP6592196B2 (en) Malignant event detection apparatus, malignant event detection method, and malignant event detection program
Abdullah et al. Preliminary study of host and network-based analysis on P2P Botnet detection
RU2703329C1 (en) Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them
Al Makdi et al. Trusted security model for IDS using deep learning
Zhao et al. Network security model based on active defense and passive defense hybrid strategy
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Sharma et al. Detection of threats in Honeynet using Honeywall
Resmi et al. Intrusion detection system techniques and tools: A survey
Balogh et al. LAN security analysis and design
Huang et al. Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211217