CN117220900A - Method and system for automatically detecting honeypot system - Google Patents

Method and system for automatically detecting honeypot system Download PDF

Info

Publication number
CN117220900A
CN117220900A CN202310870852.5A CN202310870852A CN117220900A CN 117220900 A CN117220900 A CN 117220900A CN 202310870852 A CN202310870852 A CN 202310870852A CN 117220900 A CN117220900 A CN 117220900A
Authority
CN
China
Prior art keywords
honeypot
test
type
fingerprint
target equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310870852.5A
Other languages
Chinese (zh)
Inventor
傅涛
周维强
郭金辉
郭超
张冠阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bozhi Safety Technology Co ltd
Original Assignee
Bozhi Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bozhi Safety Technology Co ltd filed Critical Bozhi Safety Technology Co ltd
Priority to CN202310870852.5A priority Critical patent/CN117220900A/en
Publication of CN117220900A publication Critical patent/CN117220900A/en
Pending legal-status Critical Current

Links

Abstract

The application discloses a method and a system for automatically detecting a honeypot system, which can automatically detect the functional integrity of the honeypot system, simultaneously carry out safety detection on a plurality of network protocols and industrial control protocols, automatically detect the simulation concealment of the honeypot, save a great deal of labor cost and obviously improve the working efficiency; the method has the advantages of low requirements on detection personnel, quick mastering, high detection efficiency, capability of acquiring mass data for comparison, and quick comprehensive evaluation, analysis and judgment of whether the honey tank simulation concealment meets the requirements.

Description

Method and system for automatically detecting honeypot system
Technical Field
The application relates to a method and a system for automatically detecting a honeypot system, belonging to the field of computer systems.
Background
The honey pot is a computer which does not take any security precaution measure and is connected with a network, but different from a general computer, a plurality of data recording programs and special-purpose self-exposure programs are operated in the honey pot, the honey pot can be regarded as a computer system with a plurality of loopholes, meanwhile, an administrator can clearly recognize the loopholes, and the honey pot can conveniently know the invasion tendency of the invader and take targeted defending measures on the invader as long as the honey pot records one action of the invader when being invaded.
The honeypot acts differently from a firewall, which has limitations and vulnerabilities in that it must be built and defended against a known dangerous rule system, if an intruder launches a new form of attack, the firewall does not deal with the corresponding rule, and the firewall acts like a dummy, and the system protected by the firewall is destroyed.
As network attacks increase, the means become more and more diverse and complex. It becomes important to attract attacks by means of honeypots and to analyze the attack method. A good honeypot system needs to simulate various protocols and equipment, and has the characteristics of containing a certain preset loopholes, ensuring complete functions and high interaction, being hidden in simulation and difficult to judge as honeypots by attackers. The disadvantages of the prior art are mainly represented by:
1) Lack of method for automatically detecting functional integrity of honeypot
There are tens of internet universal protocols and industrial control protocols at present. Each protocol supports a large number of instructions, each with a different address and parameters. When it is required to detect whether the functions of the protocols are normal and complete at the same time, the manual efficiency is extremely low, but no method is available at present to detect the protocols at the same time with high efficiency.
2) Security testing of different network protocols requires the use of different security test tools
At present, besides the HTTP protocol, the safety detection tools of other protocols are fewer, the pertinence of each tool is strong, the supported protocols are single, and the requirements of carrying out safety detection on up to dozens of network protocols and industrial control protocols at the same time cannot be met.
3) Lack of automatic detection method for honey pot simulation concealment
The honeypot simulation is used for attracting an attacker to attack, relieving the pressure of the real working system under attack, and analyzing and tracing the attack behavior. So the honeypot simulation needs to be hidden as much as possible and is not recognized as a honeypot by an attacker. Therefore, it is necessary to detect the honeypot from the viewpoint of an attacker, avoid identifying the honeypot, and improve the concealment of the honeypot, but no corresponding effective detection method exists at present.
Disclosure of Invention
In order to solve the problems that the prior art lacks a method for automatically detecting the functional integrity of a honeypot system, simultaneously carrying out safety detection on a plurality of network protocols and industrial control protocols and automatically detecting the simulation concealment of the honeypot, and simultaneously solves the problems that the honeypot detection has high requirements on detection personnel, can not be mastered quickly, has low manual detection efficiency, can not obtain mass data for comparison and can not be used for quickly and comprehensively judging whether the simulation concealment of the honeypot meets the requirements, the application provides a method for automatically detecting the honeypot system, which can automatically detect various honeypots and various objects in aspects of functions, performances, safety and the like, and improves the test completeness and the test efficiency; meanwhile, the honey pot simulation concealment is tested by using interaction test, security test and fingerprint identification, and the honey pot simulation concealment is correspondingly improved.
According to one aspect of the present application, there is provided a method of automatically detecting a honeypot system, comprising the steps of:
s1: presetting, and setting the type of parameters to be measured.
S2: and carrying out port test and IP test on the target equipment.
S3: and identifying honeypots, wherein fingerprint testing and interaction testing are carried out on the target equipment.
S4: and performing special detection on the target equipment determined to be the honeypot.
S5: and generating a detection report, outputting test contents and generating a honeypot identifiable comprehensive score.
Optionally, the step S3 further includes:
and assisting in identification, including protocol testing and data testing of the target equipment.
Optionally, the special detection in S4 includes: and performing performance test and safety test on the target equipment.
Optionally, the types of parameters to be measured in S1 include: target IP range.
Optionally, the parameter types to be tested in S1 further include a port range, a system type, and a detection type, and whether performance test and security test are performed or not may be set in the detection type, and if not, the test is not performed.
Optionally, the port test in S2 includes: checking the open port number and port type of the target device.
Optionally, the IP test in S2 includes: and carrying out survival identification on the target equipment IP, checking whether the target IP exists by sending tcp and udp messages to the target, if so, judging whether the acquired active IP is a public network IP, if so, continuing to inquire in a corresponding database, acquiring information of an operator and a cloud host provider, and comprehensively judging whether the acquired active IP is likely to be a honeypot according to the service type, the information of the operator, the cloud host and the like.
Optionally, the first database includes preset data information or purchased data information according to actual requirements.
Optionally, the fingerprint test in S3 includes: and scanning fingerprint information of the target equipment, matching the fingerprint information in a second database, and judging whether the target equipment is a honey pot or not according to a matching result.
Optionally, the fingerprint information includes at least one of: host fingerprint, operating system fingerprint, application fingerprint, protocol fingerprint.
Optionally, the second database includes a plurality of host names and fingerprint information corresponding to the host names, a plurality of operating systems and fingerprint information corresponding to the operating systems, a plurality of applications and fingerprint information corresponding to the applications, and a plurality of protocols and fingerprint information corresponding to the protocols.
Optionally, the interaction test includes: and identifying the application type according to the application fingerprint, performing automatic interaction test by using a corresponding interaction script according to the application type, and scoring the interaction degree according to the number and complexity of the steps of interaction in combination with a scoring model.
Optionally, the protocol test includes: and according to the port number automatic matching protocol type, calling a corresponding test script to request, receiving response information to analyze, judging whether the result is normal, outputting request and response log information, and judging whether the target equipment is a honeypot according to the response accuracy.
Optionally, the data testing includes: and using the provided login information to log in the system, searching whether the configuration information of the scanning system and the application is normal, searching a user name and a user file name according to a template, checking a database instance according to a database type, identifying a database instance which is not default by the system, accessing data in a table and judging whether the data is business data.
Optionally, the performance test includes: and automatically simulating multiple IP and interaction between a user and the target equipment by using multithreading, and simulating login, inquiry, modification, deletion and operation.
Optionally, the security test includes: and automatically calling a corresponding security vulnerability scanning script to test according to the target equipment operating system, the application type and the protocol type.
Optionally, the S1 includes:
s1-1: presetting the target IP range as a single IP or a plurality of IP or IP sections; support comma separated IP lists.
S1-2: presetting the port range as a single port or a plurality of ports or port intervals; port ranges specified in comma separated port list, number xxx-xxx, are supported.
S1-3: presetting the system type, and automatically identifying the system type when the system type is not set; the system type is optional, and the options can be linux, unix, windows and industrial control equipment.
Optionally, the S2 includes: and automatically carrying out port scanning on the target equipment according to the scanning script and the preset port range, checking an open port number and a port type, and identifying a service type.
In another aspect, the present application also provides an automatic detection system for a honeypot system, the system comprising:
the preset module is used for setting the type of the parameter to be detected;
the identifying module is used for identifying the target equipment and judging whether the target equipment is a honeypot system or not;
the special detection module is used for carrying out special detection on the honeypot system;
and the output module is used for recording the results of the identification and the special detection and outputting a detection report.
The application has the beneficial effects that:
1) The method for automatically detecting the honeypot system can automatically detect the functional integrity of the honeypot system, simultaneously detect a plurality of network protocols and industrial control protocols safely, automatically detect the simulation concealment of the honeypot, save a great deal of labor cost and obviously improve the working efficiency;
2) The method for automatically detecting the honeypot system has the advantages of low requirements on detection personnel, quick mastering, high detection efficiency, capability of acquiring mass data for comparison, and quick comprehensive evaluation, analysis and judgment of whether the honeypot simulation concealment meets the requirements.
Drawings
FIG. 1 is a flow chart of an overall test in one embodiment of the application;
FIG. 2 is a flow chart of an interactive test in an embodiment of the application.
Detailed Description
The present application is described in detail below with reference to examples, but the present application is not limited to these examples.
According to one embodiment of the present application, there is provided a method for automatically detecting a honeypot system, including the steps of:
s1: presetting, namely setting the types of parameters to be tested, including a target IP range, a port range, a system type and a detection type, wherein the detection type is set for performance test and security test.
S2: port testing and IP testing are carried out on target equipment, port scanning is automatically carried out on the target equipment according to a scanning script and the preset port range, an open port number and a port type are checked, and a service type is identified;
and carrying out survival identification on the target equipment IP, checking whether the target IP exists by sending tcp and udp messages to the target, if so, judging whether the acquired active IP is a public network IP, if so, continuing to inquire in a first database, acquiring information of an operator and a cloud host provider, and comprehensively judging whether the acquired active IP is likely to be a honeypot according to the service type, the information of the operator, the cloud host and the like.
S3: honeypot identification, including carrying out fingerprint test and interactive test to target equipment, fingerprint test includes: the fingerprint information of the target equipment is scanned and matched in a second database, whether the target equipment is a honey pot or not is judged according to a matching result, the fingerprint information comprises a host fingerprint, an operating system fingerprint, an application fingerprint and a protocol fingerprint, and the second database comprises a plurality of host names and fingerprint information corresponding to the host names, a plurality of operating systems and fingerprint information corresponding to the operating systems, a plurality of applications and fingerprint information corresponding to the applications and protocols and fingerprint information corresponding to the protocols.
The specific flow of the interaction test is shown in fig. 2, which comprises the following steps: and identifying the application type according to the application fingerprint, performing automatic interaction test by using a corresponding interaction script according to the application type, and scoring the interaction degree according to the number and complexity of the steps of interaction in combination with a scoring model.
The step S3 further comprises the following steps:
and assisting in identification, including protocol testing and data testing of the target equipment.
The protocol test includes: and according to the port number automatic matching protocol type, calling a corresponding test script to request, receiving response information to analyze, judging whether the result is normal, outputting request and response log information, and judging whether the target equipment is a honeypot according to the response accuracy.
The data testing includes: and using the provided login information to log in the system, searching whether the configuration information of the scanning system and the application is normal, searching a user name and a user file name according to a template, checking a database instance according to a database type, identifying a database instance which is not default by the system, accessing data in a table and judging whether the data is business data.
S4: performing special detection on the target equipment determined to be the honeypot, wherein the special detection comprises performance test and safety test on the target equipment;
the performance test comprises: automatically simulating multiple IP and interaction between a user and the target equipment by using multithreading, and simulating login, inquiry, modification, deletion and operation;
the security test comprises: and automatically calling a corresponding security vulnerability scanning script to test according to the target equipment operating system, the application type and the protocol type.
S5: and generating a detection report, outputting test contents and generating a honeypot identifiable comprehensive score.
According to another embodiment of the present application, there is also provided an automatic detection system for a honeypot system, the system including:
the preset module is used for setting the type of the parameter to be detected;
the identifying module is used for identifying the target equipment and judging whether the target equipment is a honeypot system or not;
the special detection module is used for carrying out special detection on the honeypot system;
and the output module is used for recording the results of the identification and the special detection and outputting a detection report.
While the application has been described in terms of preferred embodiments, it will be understood by those skilled in the art that various changes and modifications can be made without departing from the scope of the application, and it is intended to cover the principles of the application as defined in the appended claims.

Claims (10)

1. A method for automatically detecting a honeypot system, comprising the steps of:
s1: presetting, namely setting the type of parameters to be measured;
s2: performing port test and IP test on target equipment;
s3: honeypot identification, including fingerprint testing and interaction testing of the target device;
s4: performing special detection on the target equipment determined to be the honeypot;
s5: and generating a detection report, outputting test contents and generating a honeypot identifiable comprehensive score.
2. The method for automatically detecting a honeypot system of claim 1, wherein S3 further comprises:
auxiliary identification, including protocol testing and data testing of the target device;
preferably, the interaction test comprises: according to the application fingerprint identification application type, carrying out automatic interaction test by using a corresponding interaction script according to the application type, and scoring the interaction degree according to the number and complexity of the steps of interaction in combination with a scoring model;
preferably, the protocol test comprises: according to the port number automatic matching protocol type, calling a corresponding test script to request and receiving response information to analyze, judging whether the result is normal, outputting request and response log information, and judging whether the target equipment is a honeypot according to response accuracy;
preferably, the data testing comprises: and using the provided login information to log in the system, searching whether the configuration information of the scanning system and the application is normal, searching a user name and a user file name according to a template, checking a database instance according to a database type, identifying a database instance which is not default by the system, accessing data in a table and judging whether the data is business data.
3. The method of automatically detecting a honeypot system of claim 1, wherein the specialized detection in S4 comprises: performing performance test and safety test on the target equipment;
preferably, the performance test comprises: automatically simulating multiple IP and interaction between a user and the target equipment by using multithreading, and simulating login, inquiry, modification, deletion and operation;
preferably, the safety test comprises: and automatically calling a corresponding security vulnerability scanning script to test according to the target equipment operating system, the application type and the protocol type.
4. The method for automatically detecting a honeypot system according to claim 1, wherein the types of parameters to be detected in S1 include: a target IP range;
preferably, the parameter types to be measured in S1 further include a port range, a system type, and a detection type.
5. The method of automatically detecting a honeypot system of claim 1, wherein the port test in S2 comprises: checking the open port number and port type of the target device.
6. The method of automatically detecting a honeypot system of claim 1, wherein the IP test in S2 comprises: the method comprises the steps of performing survival identification on target equipment IP, checking whether the target IP exists by sending tcp and udp messages to the target, and inquiring the active IP in a first database to obtain operator information, cloud host information and geographic position information;
preferably, the first database includes preset data information or purchased data information according to actual requirements.
7. The method of automatically detecting a honeypot system of claim 1, wherein the fingerprint test in S3 comprises: scanning fingerprint information of the target equipment and matching the fingerprint information in a second database, and judging whether the target equipment is a honey pot or not according to a matching result;
preferably, the fingerprint information includes at least one of: host fingerprint, operating system fingerprint, application fingerprint, protocol fingerprint;
preferably, the second database includes a plurality of host names and fingerprint information corresponding thereto, a plurality of operating systems and fingerprint information corresponding thereto, a plurality of applications and fingerprint information corresponding thereto, and a plurality of protocols and fingerprint information corresponding thereto.
8. The method for automatically detecting a honeypot system of claim 5, wherein S1 comprises:
s1-1: presetting the target IP range as a single IP or a plurality of IP or IP sections;
s1-2: presetting the port range as a single port or a plurality of ports or port intervals;
s1-3: presetting the system type, and automatically identifying the system type when the system type is not set.
9. The method of automatically detecting a honeypot system of claim 8, wherein S2 comprises: and automatically carrying out port scanning on the target equipment according to the scanning script and the preset port range, checking an open port number and a port type, and identifying a service type.
10. An automated inspection system for a honeypot system, the system comprising:
the preset module is used for setting the type of the parameter to be detected;
the identifying module is used for identifying the target equipment and judging whether the target equipment is a honeypot system or not;
the special detection module is used for carrying out special detection on the honeypot system;
and the output module is used for recording the results of the identification and the special detection and outputting a detection report.
CN202310870852.5A 2023-07-14 2023-07-14 Method and system for automatically detecting honeypot system Pending CN117220900A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310870852.5A CN117220900A (en) 2023-07-14 2023-07-14 Method and system for automatically detecting honeypot system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310870852.5A CN117220900A (en) 2023-07-14 2023-07-14 Method and system for automatically detecting honeypot system

Publications (1)

Publication Number Publication Date
CN117220900A true CN117220900A (en) 2023-12-12

Family

ID=89034098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310870852.5A Pending CN117220900A (en) 2023-07-14 2023-07-14 Method and system for automatically detecting honeypot system

Country Status (1)

Country Link
CN (1) CN117220900A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018084808A1 (en) * 2016-11-04 2018-05-11 Singapore University Of Technology And Design Computer-implemented method and data processing system for testing device security
CN109617878A (en) * 2018-12-13 2019-04-12 烽台科技(北京)有限公司 A kind of construction method and system, computer readable storage medium of honey net
US20190230105A1 (en) * 2018-01-23 2019-07-25 Rapid7, Inc. Detecting anomalous internet behavior
CN111683055A (en) * 2020-05-14 2020-09-18 北京邮电大学 Industrial honey pot control method and device
CN112217800A (en) * 2020-09-14 2021-01-12 广州大学 Honeypot identification method, system, device and medium
CN112383538A (en) * 2020-11-11 2021-02-19 西安热工研究院有限公司 Hybrid high-interaction industrial honeypot system and method
CN112578761A (en) * 2021-02-03 2021-03-30 山东云天安全技术有限公司 Industrial control honey pot safety protection device and method
CN112800417A (en) * 2021-04-15 2021-05-14 远江盛邦(北京)网络安全科技股份有限公司 Identification method and system of feedback honeypot system based on service state machine
CN113132293A (en) * 2019-12-30 2021-07-16 中国移动通信集团湖南有限公司 Attack detection method and device and public honeypot system
CN113472819A (en) * 2021-09-03 2021-10-01 国际关系学院 Honeypot detection and identification method and device based on fingerprint characteristics
US20210344690A1 (en) * 2020-05-01 2021-11-04 Amazon Technologies, Inc. Distributed threat sensor analysis and correlation
CN114679292A (en) * 2021-06-10 2022-06-28 腾讯云计算(北京)有限责任公司 Honeypot identification method, device, equipment and medium based on network space mapping
CN114826663A (en) * 2022-03-18 2022-07-29 烽台科技(北京)有限公司 Honeypot identification method, honeypot identification device, honeypot identification equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018084808A1 (en) * 2016-11-04 2018-05-11 Singapore University Of Technology And Design Computer-implemented method and data processing system for testing device security
US20190230105A1 (en) * 2018-01-23 2019-07-25 Rapid7, Inc. Detecting anomalous internet behavior
CN109617878A (en) * 2018-12-13 2019-04-12 烽台科技(北京)有限公司 A kind of construction method and system, computer readable storage medium of honey net
CN113132293A (en) * 2019-12-30 2021-07-16 中国移动通信集团湖南有限公司 Attack detection method and device and public honeypot system
US20210344690A1 (en) * 2020-05-01 2021-11-04 Amazon Technologies, Inc. Distributed threat sensor analysis and correlation
CN111683055A (en) * 2020-05-14 2020-09-18 北京邮电大学 Industrial honey pot control method and device
CN112217800A (en) * 2020-09-14 2021-01-12 广州大学 Honeypot identification method, system, device and medium
CN112383538A (en) * 2020-11-11 2021-02-19 西安热工研究院有限公司 Hybrid high-interaction industrial honeypot system and method
CN112578761A (en) * 2021-02-03 2021-03-30 山东云天安全技术有限公司 Industrial control honey pot safety protection device and method
CN112800417A (en) * 2021-04-15 2021-05-14 远江盛邦(北京)网络安全科技股份有限公司 Identification method and system of feedback honeypot system based on service state machine
CN114679292A (en) * 2021-06-10 2022-06-28 腾讯云计算(北京)有限责任公司 Honeypot identification method, device, equipment and medium based on network space mapping
WO2022257226A1 (en) * 2021-06-10 2022-12-15 腾讯云计算(北京)有限责任公司 Cyberspace mapping-based honeypot recognition method and apparatus, device, and medium
CN113472819A (en) * 2021-09-03 2021-10-01 国际关系学院 Honeypot detection and identification method and device based on fingerprint characteristics
CN114826663A (en) * 2022-03-18 2022-07-29 烽台科技(北京)有限公司 Honeypot identification method, honeypot identification device, honeypot identification equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
N. NAIK等: ""Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots"", 《2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE)》, 14 October 2018 (2018-10-14) *
向全青;: "基于网络扫描技术的动态蜜罐网络设计与实现", 信息技术, no. 06, 25 June 2013 (2013-06-25) *
高丰;杜德慧;: "基于蜜网的网络监测系统的设计与实现", 信息网络安全, no. 09, 15 September 2011 (2011-09-15) *

Similar Documents

Publication Publication Date Title
CN110324310B (en) Network asset fingerprint identification method, system and equipment
CN110149350B (en) Network attack event analysis method and device associated with alarm log
CN108183895B (en) Network asset information acquisition system
EP1665011B1 (en) Method and system for displaying network security incidents
US8555393B2 (en) Automated testing for security vulnerabilities of devices
CN112182588B (en) Threat information-based operating system vulnerability analysis and detection method and system
CN108830084B (en) Handheld terminal for realizing vulnerability scanning and protection reinforcement and protection method
CN110881043B (en) Method and device for detecting web server vulnerability
US8146146B1 (en) Method and apparatus for integrated network security alert information retrieval
CN114070629A (en) Safety arrangement and automatic response method, device and system for APT (advanced persistent threat) attack
CN110460481B (en) Identification method of network key assets
Laštovička et al. Network monitoring and enumerating vulnerabilities in large heterogeneous networks
CN114143064A (en) Multi-source network security alarm event tracing and automatic processing method and device
CN116708028B (en) External attack surface management method and system based on attacker view angle
Adamović Penetration testing and vulnerability assessment: introduction, phases, tools and methods
CN113381980A (en) Information security defense method and system, electronic device and storage medium
CN116318783B (en) Network industrial control equipment safety monitoring method and device based on safety index
CN117220900A (en) Method and system for automatically detecting honeypot system
CN115913634A (en) Network security abnormity detection method and system based on deep learning
KR100772177B1 (en) Method and apparatus for generating intrusion detection event to test security function
CN115361219A (en) Log file processing method, electronic device and storage medium
US11108800B1 (en) Penetration test monitoring server and system
Vos Capability Maturity Measurement of a Security Operations Center through Analysis Detection
CN111355688A (en) Core method and device for automatic infiltration and analysis based on AI technology
Swart et al. Towards a platform to visualize the state of South Africa's information security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination