CN104978519A - Implementation method and device of application-type honeypot - Google Patents

Implementation method and device of application-type honeypot Download PDF

Info

Publication number
CN104978519A
CN104978519A CN201410598007.8A CN201410598007A CN104978519A CN 104978519 A CN104978519 A CN 104978519A CN 201410598007 A CN201410598007 A CN 201410598007A CN 104978519 A CN104978519 A CN 104978519A
Authority
CN
China
Prior art keywords
application service
honey jar
application
service
honeypot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410598007.8A
Other languages
Chinese (zh)
Inventor
王维
李柏松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201410598007.8A priority Critical patent/CN104978519A/en
Publication of CN104978519A publication Critical patent/CN104978519A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an implementation method and device of an application-type honeypot. The implementation method comprises the following steps: obtaining application service to be simulated and the attribute information and the application environment of the application service to be simulated, and deploying the same application service and application environment into the honeypot; setting the corresponding attributes of the honeypot, for example, a login account of the application service of the honeypot is set to be the same with the application service to be simulated, and the known controllable security holes of at least one application service is opened; according to a user flag, carrying out decryption processing on all pieces of business data in the application service, applying a confounding algorithm to carry out deformation processing on all pieces of business data, and then, importing the business data into the application service of the honeypot; and importing newly-added business data into the application service of the honeypot in fixed time or real time. The invention also provides corresponding equipment. The application-type honeypot can be combined with the real business data of the user to confuse an attacker to a maximum degree, and the attacker is enabled to think that the honeypot is the real application service data of the user.

Description

A kind of implementation method of applied honey jar and device
Technical field
The present invention relates to computer safety field, particularly a kind of implementation method of applied honey jar and device.
Background technology
Honeypot Techniques is a kind of by disguising oneself as value with the main frame of BUG or defect and service, attract assailant or malicious code invasion, thus analyze behavior motive and the ins and outs of this assailant or malicious code, for research and defence etc.
Current network security industry is generally divided into low mutual honey jar and height mutual honey jar two class for Honeypot Techniques: it is very elementary mutual that low mutual honey jar generally adopts low layer analogue technique to realize, the network behavior caught is also very limited, Typical Representative is HoneyD, Nepenthes, Dionaea; The service of camouflage after Full Featured service that what high mutual honey jar adopted is generally or amendment, in network install agents or flow analysis module or install behavior monitoring module in system background.
But along with the evolution of network power amplifier technology, for the Detection Techniques also evolution thereupon of honey jar service, the interests that current assailant pursues are more prone to secret of the trade or government's back-end data, because Honeypot Techniques is comprehensively open, generally invading successfully, first assailant detects the resource value on current hosts, if have value, after taking all data, just hide, to ensure sustainable acquisition more data in the future.And current Honeypot Techniques or product enter to provide basic service to simulate, or run real service on a virtual machine, but the data carried are very simple, and being therefore easy to perceived current system is honey jar, thus cannot get the real intention of assailant and collect evidence.
Summary of the invention
Based on the problems referred to above, the invention provides a kind of implementation method and device of applied honey jar, by adopting the true application service and True Data that processed, the service of solving in existing Honeypot Techniques and data too simple, easily be perceived the problem into honey jar, ensure the activity of data in honey jar simultaneously, reach the object that assailant or malicious code can be attracted to run in honey jar.
A kind of applied honey jar implementation method, comprising:
Obtain the application service that will simulate and attribute information thereof and applied environment, and dispose identical application service and applied environment in honey jar; Namely honey jar is built with real service;
The login account arranging the application service of described honey jar is identical with the application service that will simulate, and the known controllable security breaches of at least one application service open; According to the usual requirement to honey pot system, the security configuration that main frame is used for honey jar maintenance and management will arrange high as far as possible; Security strategy for the honey jar service come out will arrange low as far as possible, therefore also should ensure that honey jar place equipment should lower than the level of security of actual services system equipment, and the application service of honey jar arranges corresponding controllable safety leak, to enable assailant be easier to access the data in honey jar;
The application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority; Namely record detailed interactive log, and the control of authority read and revise is in safe range.
According to user's mark, DecryptDecryption process is carried out to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar;
According to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.
In described method, described honey jar adopts the equipment identical with the application service that will simulate.
In described method, what be set to by the fire wall of honey jar place equipment only to allow honey jar service and honey jar administrative institute to need outreaches request, forbids other access behaviors, and carries out record to other access behaviors produced.Port for other services request all should be closed, and blocks the unknown and enters and outreach request.
In described method, application service in described honey jar is set to most I and runs authority.
In described method, also comprise and attack monitoring is carried out to the application service of honey jar, if process is lost, then determine to occur Vulnerability events.
A kind of applied honey jar implement device, comprising:
Application deployment module, for obtaining the application service and attribute information thereof and applied environment that will simulate, and disposes identical application service and applied environment in honey jar;
Control module is set, identical with the application service that will simulate for the login account arranging the application service of described honey jar, and the known controllable security breaches of at least one application service open; The application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority;
Data importing module, for according to user's mark, carries out DecryptDecryption process to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar;
Update module, for according to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.
In described device, described honey jar adopts the equipment identical with the application service that will simulate.
In described device, described arrange that the fire wall of honey jar place equipment is also set to only to allow honey jar service and honey jar administrative institute to need by control module outreach request, forbid other access behaviors, and record carried out to other access behaviors produced.
In described device, the described control module that arranges also runs authority for application service in described honey jar being set to most I.
In described device, also comprise monitoring module, for carrying out attack monitoring to the application service of honey jar, if process is lost, then determine to occur Vulnerability events.
Advantage of the present invention is, passage is deployed in the true application service on true main frame, and making scanning tools cannot distinguish this equipment is actual services equipment or honey jar equipment, and assailant is thought, and current device is its intrusion target; And by follow-up supplementing business datum, honey jar is become and enlivens main frame, make assailant more be ready to hide in main frame.And by carrying out DecryptDecryption process to the whole business datums in application service, both ensure that the confidence level of data in honey jar, in turn ensure that data message can not be revealed.The honey jar that the present invention realizes, by reply network sweep with attack more traditional honey jar in threat and more easily confuse assailant, contributes to the darker behavior intention of realizing assailant and analyzes evidence obtaining.
The invention provides a kind of method described in applied honey jar implementation method and device, comprising: obtain the application service that will simulate and attribute information thereof and applied environment, and dispose identical application service and applied environment in honey jar; And the respective attributes of honey jar is arranged, the login account as the application service of honey jar as described in arranging is identical with the application service that will simulate, and the known controllable security breaches of at least one application service open; According to user's mark, DecryptDecryption process is carried out to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar; And regularly or in real time can import newly-increased business datum in the application service of honey jar.The present invention also proposes corresponding equipment, by application layer honey jar of the present invention, can in conjunction with the actual services data of user, and farthest confuse assailant, honey jar is the true application service data of user to make it think.
Accompanying drawing explanation
In order to be illustrated more clearly in the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the implementation method process flow diagram of a kind of applied honey jar of the present invention;
Fig. 2 is the implement device structural drawing of a kind of applied honey jar of the present invention.
Embodiment
In order to make those skilled in the art person understand technical scheme in the embodiment of the present invention better, and enable above-mentioned purpose of the present invention, feature and advantage become apparent more, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail.
The invention provides a kind of implementation method and device of applied honey jar, by adopting the true application service and True Data that processed, the service of solving in existing Honeypot Techniques and data too simple, easily be perceived the problem into honey jar, ensure the activity of data in honey jar simultaneously, reach the object that assailant or malicious code can be attracted to run in honey jar.
A kind of applied honey jar implementation method, as shown in Figure 1, comprising:
S101: obtain the application service that will simulate and attribute information thereof and applied environment, and dispose identical application service and applied environment in honey jar; Namely honey jar is built with real service;
S102: the login account arranging the application service of described honey jar is identical with the application service that will simulate, and the known controllable security breaches of at least one application service open; According to the usual requirement to honey pot system, the security configuration that main frame is used for honey jar maintenance and management will arrange high as far as possible; Security strategy for the honey jar service come out will arrange low as far as possible, therefore also should ensure that honey jar place equipment should lower than the level of security of actual services system equipment, and the application service of honey jar arranges corresponding controllable safety leak, to enable assailant be easier to access the data in honey jar; Known controlled security breaches are as account weak passwurd, and IP connects restriction etc., makes assailant than being easier to have access to the data in honey jar;
S103: the application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority; Namely record detailed interactive log, and the control of authority read and revise is in safe range, carries out data interaction as the passages such as syslog can be adopted.
S104: according to user's mark, DecryptDecryption process is carried out to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar; Data DecryptDecryption refers to the distortion some sensitive information being carried out to data, realize the reliably protecting of privacy-sensitive data, even can also carry out the data of the current honey jar of random configuration data stuffing, reach and neither user profile is revealed, data can be made again to seem reasonable, reach the object of fascination assailant;
S105: according to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.The Added Business data regularly or in real time imported also need to carry out the process such as DecryptDecryption, and regularly or in real time import newly-increased business datum, can keep the activity of honey jar, make it closer to real application service.Newly-increased business datum can be obtained by multiple channel, as the daily record of application service, regular backup or some audit product also possess same ability.
In described method, described honey jar adopts the equipment identical with the application service that will simulate.Adopt identical device to carry out simulation and can ensure that honey jar adopts real equipment and service arrangement to realize, be deployed on real main process equipment instead of on virtual machine, make scanning tools cannot distinguish honey jar and true main frame.
In described method, what be set to by the fire wall of honey jar place equipment only to allow honey jar service and honey jar administrative institute to need outreaches request, forbids other access behaviors, and carries out record to other access behaviors produced.Port for other services request all should be closed, and blocks the unknown and enters and outreach request.
In described method, application service in described honey jar is set to most I and runs authority.
In described method, also comprise and attack monitoring is carried out to the application service of honey jar, if process is lost, then determine to occur Vulnerability events.The means of process monitoring or the dump of collapse process can be adopted, once the process of discovery is lost, then think to have occurred serious Vulnerability events.
The present invention also proposes a kind of applied honey jar implement device, as shown in Figure 2, comprising:
Application deployment module 201, for obtaining the application service and attribute information thereof and applied environment that will simulate, and disposes identical application service and applied environment in honey jar;
Control module 202 is set, identical with the application service that will simulate for the login account arranging the application service of described honey jar, and the known controllable security breaches of at least one application service open; The application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority;
Data importing module 203, for according to user's mark, carries out DecryptDecryption process to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar;
Update module 204, for according to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.
In described device, described honey jar adopts the equipment identical with the application service that will simulate.
In described device, described arrange that the fire wall of honey jar place equipment is also set to only to allow honey jar service and honey jar administrative institute to need by control module outreach request, forbid other access behaviors, and record carried out to other access behaviors produced.
In described device, the described control module that arranges also runs authority for application service in described honey jar being set to most I.
In described device, also comprise monitoring module 205, for carrying out attack monitoring to the application service of honey jar, if process is lost, then determine to occur Vulnerability events.
Advantage of the present invention is, passage is deployed in the true application service on true main frame, and making scanning tools cannot distinguish this equipment is actual services equipment or honey jar equipment, and assailant is thought, and current device is its intrusion target; And by follow-up supplementing business datum, honey jar is become and enlivens main frame, make assailant more be ready to hide in main frame.And by carrying out DecryptDecryption process to the whole business datums in application service, both ensure that the confidence level of data in honey jar, in turn ensure that data message can not be revealed.The honey jar that the present invention realizes, by reply network sweep with attack more traditional honey jar in threat and more easily confuse assailant, contributes to the darker behavior intention of realizing assailant and analyzes evidence obtaining.
The invention provides a kind of method described in applied honey jar implementation method and device, comprising: obtain the application service that will simulate and attribute information thereof and applied environment, and dispose identical application service and applied environment in honey jar; And the respective attributes of honey jar is arranged, the login account as the application service of honey jar as described in arranging is identical with the application service that will simulate, and the known controllable security breaches of at least one application service open; According to user's mark, DecryptDecryption process is carried out to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar; And regularly or in real time can import newly-increased business datum in the application service of honey jar.The present invention also proposes corresponding equipment, by application layer honey jar of the present invention, can in conjunction with the actual services data of user, and farthest confuse assailant, honey jar is the true application service data of user to make it think.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for system embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
Although depict the present invention by embodiment, those of ordinary skill in the art know, the present invention has many distortion and change and do not depart from spirit of the present invention, and the claim appended by wishing comprises these distortion and change and do not depart from spirit of the present invention.

Claims (10)

1. an applied honey jar implementation method, is characterized in that, comprising:
Obtain the application service that will simulate and attribute information thereof and applied environment, and dispose identical application service and applied environment in honey jar;
The login account arranging the application service of described honey jar is identical with the application service that will simulate, and the known controllable security breaches of at least one application service open; The application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority;
According to user's mark, DecryptDecryption process is carried out to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar;
According to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.
2. the method for claim 1, is characterized in that, described honey jar adopts the equipment identical with the application service that will simulate.
3. method as claimed in claim 2, is characterized in that, what be set to by the fire wall of honey jar place equipment only to allow honey jar service and honey jar administrative institute to need outreaches request, forbids other access behaviors, and carries out record to other access behaviors produced.
4. the method for claim 1, is characterized in that, the application service of described honey jar is set to most I and runs authority.
5. the method for claim 1, is characterized in that, also comprises and carries out attack monitoring to the application service of honey jar, if process is lost, then determine to occur Vulnerability events.
6. an applied honey jar implement device, is characterized in that, comprising:
Application deployment module, for obtaining the application service and attribute information thereof and applied environment that will simulate, and disposes identical application service and applied environment in honey jar;
Control module is set, identical with the application service that will simulate for the login account arranging the application service of described honey jar, and the known controllable security breaches of at least one application service open; The application service arranging described honey jar is full-time record, and described daily record only keeper there is amendment authority;
Data importing module, for according to user's mark, carries out DecryptDecryption process to the whole business datums in described application service, and uses Obfuscating Algorithms by after whole business datum deformation process, import in the application service of honey jar;
Update module, for according to Preset Time, regularly or in the application service of honey jar, import newly-increased business datum in real time.
7. device as claimed in claim 6, is characterized in that, described honey jar adopts the equipment identical with the application service that will simulate.
8. device as claimed in claim 7, it is characterized in that, described arrange that the fire wall of honey jar place equipment is also set to only to allow honey jar service and honey jar administrative institute to need by control module outreach request, forbid other access behaviors, and record carried out to other access behaviors produced.
9. device as claimed in claim 6, is characterized in that, the described control module that arranges also runs authority for the application service of described honey jar being set to most I.
10. device as claimed in claim 6, is characterized in that, also comprise monitoring module, for carrying out attack monitoring to the application service of honey jar, if process is lost, then determines to occur Vulnerability events.
CN201410598007.8A 2014-10-31 2014-10-31 Implementation method and device of application-type honeypot Pending CN104978519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410598007.8A CN104978519A (en) 2014-10-31 2014-10-31 Implementation method and device of application-type honeypot

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410598007.8A CN104978519A (en) 2014-10-31 2014-10-31 Implementation method and device of application-type honeypot

Publications (1)

Publication Number Publication Date
CN104978519A true CN104978519A (en) 2015-10-14

Family

ID=54275013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410598007.8A Pending CN104978519A (en) 2014-10-31 2014-10-31 Implementation method and device of application-type honeypot

Country Status (1)

Country Link
CN (1) CN104978519A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209919A (en) * 2016-09-18 2016-12-07 深圳市深信服电子科技有限公司 A kind of network safety protection method and network security protection system
CN107332823A (en) * 2017-06-06 2017-11-07 北京明朝万达科技股份有限公司 A kind of server camouflage method and system based on machine learning
CN107644161A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Safety detecting method, device and the equipment of sample
CN108134797A (en) * 2017-12-28 2018-06-08 广州锦行网络科技有限公司 System and method is realized in attack counter based on Honeypot Techniques
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN109033885A (en) * 2017-06-09 2018-12-18 腾讯科技(深圳)有限公司 A kind of data response method, terminal device and server
CN109462599A (en) * 2018-12-13 2019-03-12 烽台科技(北京)有限公司 A kind of honey jar management system
CN109711173A (en) * 2019-02-03 2019-05-03 北京大学 A kind of password file leakage detection method
US10419480B1 (en) 2017-08-24 2019-09-17 Amdocs Development Limited System, method, and computer program for real-time cyber intrusion detection and intruder identity analysis
CN110709843A (en) * 2017-05-08 2020-01-17 美光科技公司 Encrypted lasso software tamper detection
CN110865597A (en) * 2018-12-18 2020-03-06 哈尔滨安天科技集团股份有限公司 Industrial control system and safety protection method thereof
CN110912898A (en) * 2019-11-26 2020-03-24 成都知道创宇信息技术有限公司 Method and device for disguising equipment assets, electronic equipment and storage medium
CN111404934A (en) * 2020-03-16 2020-07-10 广州锦行网络科技有限公司 Network attack tracing method and system based on dynamic and static combination mode and honey mark technology
CN111506316A (en) * 2020-03-20 2020-08-07 微梦创科网络科技(中国)有限公司 Automatic honeypot deployment method and device
CN111756742A (en) * 2020-06-24 2020-10-09 广州锦行网络科技有限公司 Honeypot deception defense system and deception defense method thereof
CN112104613A (en) * 2020-08-24 2020-12-18 广州锦行网络科技有限公司 Honey net testing system based on data flow packet analysis and testing method thereof
CN114070630A (en) * 2021-11-17 2022-02-18 国网四川省电力公司眉山供电公司 Viscous honeypot system and interaction method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101567887A (en) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 Vulnerability simulation overload honeypot method
EP2244418A1 (en) * 2008-07-28 2010-10-27 Chengdu Huawei Symantec Technologies Co., Ltd. Database security monitoring method, device and system
CN103440454A (en) * 2013-08-01 2013-12-11 上海交通大学 Search engine keyword-based active honeypot detection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2244418A1 (en) * 2008-07-28 2010-10-27 Chengdu Huawei Symantec Technologies Co., Ltd. Database security monitoring method, device and system
CN101567887A (en) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 Vulnerability simulation overload honeypot method
CN103440454A (en) * 2013-08-01 2013-12-11 上海交通大学 Search engine keyword-based active honeypot detection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张鑫: "基于蜜罐技术的攻击特征自动提取技术研究", 《中国优秀硕士学位论文全文数据库》 *
王宏群等: "基于蜜罐技术的企业网络安全模型研究", 《湖南理工学院学报(自然科学版)》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107644161A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Safety detecting method, device and the equipment of sample
CN106209919A (en) * 2016-09-18 2016-12-07 深圳市深信服电子科技有限公司 A kind of network safety protection method and network security protection system
CN110709843B (en) * 2017-05-08 2023-08-25 美光科技公司 Encryption lux software compromise detection
CN110709843A (en) * 2017-05-08 2020-01-17 美光科技公司 Encrypted lasso software tamper detection
CN107332823A (en) * 2017-06-06 2017-11-07 北京明朝万达科技股份有限公司 A kind of server camouflage method and system based on machine learning
CN109033885A (en) * 2017-06-09 2018-12-18 腾讯科技(深圳)有限公司 A kind of data response method, terminal device and server
US10419480B1 (en) 2017-08-24 2019-09-17 Amdocs Development Limited System, method, and computer program for real-time cyber intrusion detection and intruder identity analysis
CN108134797A (en) * 2017-12-28 2018-06-08 广州锦行网络科技有限公司 System and method is realized in attack counter based on Honeypot Techniques
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN109462599A (en) * 2018-12-13 2019-03-12 烽台科技(北京)有限公司 A kind of honey jar management system
CN110865597A (en) * 2018-12-18 2020-03-06 哈尔滨安天科技集团股份有限公司 Industrial control system and safety protection method thereof
CN109711173B (en) * 2019-02-03 2020-10-09 北京大学 Password file leakage detection method
CN109711173A (en) * 2019-02-03 2019-05-03 北京大学 A kind of password file leakage detection method
CN110912898A (en) * 2019-11-26 2020-03-24 成都知道创宇信息技术有限公司 Method and device for disguising equipment assets, electronic equipment and storage medium
CN111404934A (en) * 2020-03-16 2020-07-10 广州锦行网络科技有限公司 Network attack tracing method and system based on dynamic and static combination mode and honey mark technology
CN111404934B (en) * 2020-03-16 2021-01-29 广州锦行网络科技有限公司 Network attack tracing method and system based on dynamic and static combination mode and honey mark technology
CN111506316A (en) * 2020-03-20 2020-08-07 微梦创科网络科技(中国)有限公司 Automatic honeypot deployment method and device
CN111506316B (en) * 2020-03-20 2023-02-24 微梦创科网络科技(中国)有限公司 Automatic honeypot deployment method and device
CN111756742A (en) * 2020-06-24 2020-10-09 广州锦行网络科技有限公司 Honeypot deception defense system and deception defense method thereof
CN111756742B (en) * 2020-06-24 2021-07-13 广州锦行网络科技有限公司 Honeypot deception defense system and deception defense method thereof
CN112104613A (en) * 2020-08-24 2020-12-18 广州锦行网络科技有限公司 Honey net testing system based on data flow packet analysis and testing method thereof
CN114070630A (en) * 2021-11-17 2022-02-18 国网四川省电力公司眉山供电公司 Viscous honeypot system and interaction method thereof

Similar Documents

Publication Publication Date Title
CN104978519A (en) Implementation method and device of application-type honeypot
CN110381045B (en) Attack operation processing method and device, storage medium and electronic device
Zhang et al. Three decades of deception techniques in active cyber defense-retrospect and outlook
US20180309787A1 (en) Deploying deception campaigns using communication breadcrumbs
Brewer Advanced persistent threats: minimising the damage
EP2955894B1 (en) Deception network system
CN109462599B (en) Honeypot management system
CN104104679A (en) Data processing method based on private cloud
CN104980423A (en) Advanced persistent threat trapping system and method
Eastman et al. Big data and predictive analytics: on the cybersecurity front line
CN118337540B (en) Internet of things-based network intrusion attack recognition system and method
CN115277068A (en) Novel honeypot system and method based on deception defense
Anisetti et al. Security threat landscape
CN115134166A (en) Attack tracing method based on honey holes
Gudala et al. Leveraging Machine Learning for Enhanced Threat Detection and Response in Zero Trust Security Frameworks: An Exploration of Real-Time Anomaly Identification and Adaptive Mitigation Strategies
Aljurayban et al. Framework for cloud intrusion detection system service
Pitropakis et al. It's All in the Cloud: Reviewing Cloud Security
Saini et al. Vulnerability and Attack Detection Techniques: Intrusion Detection System
Asgarkhani et al. A strategic approach to managing security in SCADA systems
Lau et al. Securing supervisory control and data acquisition control systems
Mocanu et al. Intrusion Detection Platform with Virtual Honeypots
Wagner Building More Resilient Cybersecurity Solutions for Infrastructure Systems
Asante et al. DIGITAL FORENSIC READINESS FRAMEWORK BASED ON HONEYPOT AND HONEYNET FOR BYOD
Le Quality trade-offs in self-protecting system
Lakshmi Security enabled UAVs for Tech-Agriculture monitoring rice crops using FIBOR architecture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151014