CN108353078A - 动态蜜罐系统 - Google Patents

动态蜜罐系统 Download PDF

Info

Publication number
CN108353078A
CN108353078A CN201680062961.2A CN201680062961A CN108353078A CN 108353078 A CN108353078 A CN 108353078A CN 201680062961 A CN201680062961 A CN 201680062961A CN 108353078 A CN108353078 A CN 108353078A
Authority
CN
China
Prior art keywords
processor
computing device
target application
application
resources
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680062961.2A
Other languages
English (en)
Chinese (zh)
Inventor
S·A·艾哈迈德扎德赫
N·伊斯兰
M·克里斯托多雷斯库
R·古普塔
S·M·达斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN108353078A publication Critical patent/CN108353078A/zh
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
CN201680062961.2A 2015-11-09 2016-10-11 动态蜜罐系统 Pending CN108353078A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/935,522 2015-11-09
US14/935,522 US20170134405A1 (en) 2015-11-09 2015-11-09 Dynamic Honeypot System
PCT/US2016/056438 WO2017083043A1 (en) 2015-11-09 2016-10-11 Dynamic honeypot system

Publications (1)

Publication Number Publication Date
CN108353078A true CN108353078A (zh) 2018-07-31

Family

ID=57218995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680062961.2A Pending CN108353078A (zh) 2015-11-09 2016-10-11 动态蜜罐系统

Country Status (8)

Country Link
US (1) US20170134405A1 (https=)
EP (1) EP3375159B1 (https=)
JP (1) JP2018536932A (https=)
KR (1) KR20180080227A (https=)
CN (1) CN108353078A (https=)
BR (1) BR112018009375A8 (https=)
TW (1) TW201717088A (https=)
WO (1) WO2017083043A1 (https=)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381045A (zh) * 2019-07-09 2019-10-25 腾讯科技(深圳)有限公司 攻击操作的处理方法和装置、存储介质及电子装置
CN111308958A (zh) * 2019-11-14 2020-06-19 广州安加互联科技有限公司 一种基于蜜罐技术的cnc设备仿真方法、系统和工控蜜罐
CN111431891A (zh) * 2020-03-20 2020-07-17 广州锦行网络科技有限公司 一种蜜罐部署方法
CN111541670A (zh) * 2020-04-17 2020-08-14 广州锦行网络科技有限公司 一种新型动态蜜罐系统
CN112039861A (zh) * 2020-08-20 2020-12-04 咪咕文化科技有限公司 风险识别方法、装置、电子设备和计算机可读存储介质
CN112800417A (zh) * 2021-04-15 2021-05-14 远江盛邦(北京)网络安全科技股份有限公司 基于服务状态机的反馈式蜜罐系统的识别方法及系统
CN113609483A (zh) * 2021-07-16 2021-11-05 山东云海国创云计算装备产业创新中心有限公司 一种服务器病毒处理的方法、装置、设备及可读介质
WO2022111268A1 (en) * 2020-11-25 2022-06-02 International Business Machines Corporation Defense of targeted database attacks through dynamic honeypot database response generation
CN115136080A (zh) * 2020-02-28 2022-09-30 纳米电子成像有限公司 用于智能地仿真工厂控制系统和模拟响应数据的方法、系统和装置
US12111922B2 (en) 2020-02-28 2024-10-08 Nanotronics Imaging, Inc. Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US12111923B2 (en) 2019-10-08 2024-10-08 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
US12140926B2 (en) 2019-02-28 2024-11-12 Nanotronics Imaging, Inc. Assembly error correction for assembly lines
US12153401B2 (en) 2019-11-06 2024-11-26 Nanotronics Imaging, Inc. Systems, methods, and media for manufacturing processes
US12153408B2 (en) 2019-11-06 2024-11-26 Nanotronics Imaging, Inc. Systems, methods, and media for manufacturing processes
US12153412B2 (en) 2019-06-24 2024-11-26 Nanotronics Imaging, Inc. Predictive process control for a manufacturing process
US12153668B2 (en) 2019-11-20 2024-11-26 Nanotronics Imaging, Inc. Securing industrial production from sophisticated attacks
US12155673B2 (en) 2019-12-19 2024-11-26 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems

Families Citing this family (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9710648B2 (en) 2014-08-11 2017-07-18 Sentinel Labs Israel Ltd. Method of malware detection and system thereof
US11507663B2 (en) 2014-08-11 2022-11-22 Sentinel Labs Israel Ltd. Method of remediating operations performed by a program and system thereof
US9602536B1 (en) 2014-12-04 2017-03-21 Amazon Technologies, Inc. Virtualized network honeypots
US10178195B2 (en) 2015-12-04 2019-01-08 Cloudflare, Inc. Origin server protection notification
US10135867B2 (en) * 2015-12-08 2018-11-20 Bank Of America Corporation Dynamically updated computing environments for detecting and capturing unauthorized computer activities
US20170228540A1 (en) * 2016-02-09 2017-08-10 Appdome Ltd. Method and a system for detecting malicious code activity by generating software traps per application
GB201603118D0 (en) * 2016-02-23 2016-04-06 Eitc Holdings Ltd Reactive and pre-emptive security system based on choice theory
US10419472B2 (en) * 2016-03-18 2019-09-17 AO Kaspersky Lab System and method for repairing vulnerabilities of devices connected to a data network
US10528734B2 (en) * 2016-03-25 2020-01-07 The Mitre Corporation System and method for vetting mobile phone software applications
US10326796B1 (en) * 2016-04-26 2019-06-18 Acalvio Technologies, Inc. Dynamic security mechanisms for mixed networks
US9979750B2 (en) 2016-04-26 2018-05-22 Acalvio Technologies, Inc. Tunneling for network deceptions
US10581914B2 (en) 2016-06-03 2020-03-03 Ciena Corporation Method and system of mitigating network attacks
JP6738013B2 (ja) * 2016-06-23 2020-08-12 富士通株式会社 攻撃内容分析プログラム、攻撃内容分析方法及び攻撃内容分析装置
US10715533B2 (en) * 2016-07-26 2020-07-14 Microsoft Technology Licensing, Llc. Remediation for ransomware attacks on cloud drive folders
EP3291501A1 (en) * 2016-08-31 2018-03-07 Siemens Aktiengesellschaft System and method for using a virtual honeypot in an industrial automation system and cloud connector
US10447734B2 (en) * 2016-11-11 2019-10-15 Rapid7, Inc. Monitoring scan attempts in a network
US10298605B2 (en) * 2016-11-16 2019-05-21 Red Hat, Inc. Multi-tenant cloud security threat detection
US10599842B2 (en) * 2016-12-19 2020-03-24 Attivo Networks Inc. Deceiving attackers in endpoint systems
US11695800B2 (en) 2016-12-19 2023-07-04 SentinelOne, Inc. Deceiving attackers accessing network data
US11616812B2 (en) 2016-12-19 2023-03-28 Attivo Networks Inc. Deceiving attackers accessing active directory data
US10924502B2 (en) * 2016-12-29 2021-02-16 Noblis, Inc. Network security using inflated files for anomaly detection
US10223536B2 (en) * 2016-12-29 2019-03-05 Paypal, Inc. Device monitoring policy
US10628585B2 (en) 2017-01-23 2020-04-21 Microsoft Technology Licensing, Llc Ransomware resilient databases
CN109033885B (zh) * 2017-06-09 2022-11-18 腾讯科技(深圳)有限公司 一种数据响应方法、终端设备以及服务器
WO2019032728A1 (en) 2017-08-08 2019-02-14 Sentinel Labs, Inc. METHODS, SYSTEMS AND DEVICES FOR DYNAMICALLY MODELING AND REGROUPING END POINTS FOR ONBOARD NETWORKING
US20190108355A1 (en) * 2017-10-09 2019-04-11 Digital Guardian, Inc. Systems and methods for identifying potential misuse or exfiltration of data
US10867039B2 (en) * 2017-10-19 2020-12-15 AO Kaspersky Lab System and method of detecting a malicious file
US10915629B2 (en) * 2017-11-02 2021-02-09 Paypal, Inc. Systems and methods for detecting data exfiltration
US10771482B1 (en) * 2017-11-14 2020-09-08 Ca, Inc. Systems and methods for detecting geolocation-aware malware
US10826939B2 (en) * 2018-01-19 2020-11-03 Rapid7, Inc. Blended honeypot
US11368474B2 (en) 2018-01-23 2022-06-21 Rapid7, Inc. Detecting anomalous internet behavior
US11470115B2 (en) 2018-02-09 2022-10-11 Attivo Networks, Inc. Implementing decoys in a network environment
US12455778B2 (en) 2018-07-06 2025-10-28 Capital One Services, Llc Systems and methods for data stream simulation
US10404747B1 (en) * 2018-07-24 2019-09-03 Illusive Networks Ltd. Detecting malicious activity by using endemic network hosts as decoys
US12289321B2 (en) * 2019-03-04 2025-04-29 Microsoft Technology Licensing, Llc Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform
US20220147614A1 (en) * 2019-03-05 2022-05-12 Siemens Industry Software Inc. Machine learning-based anomaly detections for embedded software applications
US11057428B1 (en) * 2019-03-28 2021-07-06 Rapid7, Inc. Honeytoken tracker
US10762200B1 (en) 2019-05-20 2020-09-01 Sentinel Labs Israel Ltd. Systems and methods for executable code detection, automatic feature extraction and position independent code detection
US10630677B1 (en) 2019-06-06 2020-04-21 NortonLifeLock Inc. Systems and methods for protecting users
CN110675228B (zh) * 2019-09-27 2021-05-28 支付宝(杭州)信息技术有限公司 用户购票行为检测方法以及装置
CN113132293B (zh) * 2019-12-30 2022-10-04 中国移动通信集团湖南有限公司 攻击检测方法、设备及公共蜜罐系统
US11030261B1 (en) * 2020-08-06 2021-06-08 Coupang Corp. Computerized systems and methods for managing and monitoring services and modules on an online platform
US11720709B1 (en) 2020-12-04 2023-08-08 Wells Fargo Bank, N.A. Systems and methods for ad hoc synthetic persona creation
US11579857B2 (en) 2020-12-16 2023-02-14 Sentinel Labs Israel Ltd. Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
CN112788023B (zh) * 2020-12-30 2023-02-24 成都知道创宇信息技术有限公司 基于安全网络的蜜罐管理方法及相关装置
US11641366B2 (en) 2021-01-11 2023-05-02 Bank Of America Corporation Centralized tool for identifying and blocking malicious communications transmitted within a network
US11386197B1 (en) 2021-01-11 2022-07-12 Bank Of America Corporation System and method for securing a network against malicious communications through peer-based cooperation
US12289343B2 (en) 2021-02-18 2025-04-29 Ciena Corporation Detecting malicious threats in a 5G network slice
US11777988B1 (en) * 2021-03-09 2023-10-03 Rapid7, Inc. Probabilistically identifying anomalous honeypot activity
US20220374516A1 (en) * 2021-05-20 2022-11-24 Stairwell, Inc. Real time threat knowledge graph
US11947694B2 (en) 2021-06-29 2024-04-02 International Business Machines Corporation Dynamic virtual honeypot utilizing honey tokens and data masking
US11899782B1 (en) 2021-07-13 2024-02-13 SentinelOne, Inc. Preserving DLL hooks
US12401601B2 (en) 2021-12-13 2025-08-26 International Business Machines Corporation Recertification of access control information based on context information estimated from network traffic
CN114168947B (zh) * 2021-12-14 2022-10-25 Tcl通讯科技(成都)有限公司 一种攻击检测方法、装置、电子设备及存储介质
IT202100033158A1 (it) * 2021-12-30 2023-06-30 Thegg Domotica S R L Dispositivo honeypot tailor-made e relativo metodo di realizzazione nel rispetto normativo di applicazione
US12452273B2 (en) 2022-03-30 2025-10-21 SentinelOne, Inc Systems, methods, and devices for preventing credential passing attacks
US20230421562A1 (en) * 2022-05-19 2023-12-28 Capital One Services, Llc Method and system for protection of cloud-based infrastructure
WO2024044559A1 (en) 2022-08-22 2024-02-29 SentinelOne, Inc. Systems and methods of data selection for iterative training using zero knowledge clustering
WO2024152041A1 (en) 2023-01-13 2024-07-18 SentinelOne, Inc. Classifying cybersecurity threats using machine learning on non-euclidean data
US20240406173A1 (en) * 2023-06-05 2024-12-05 U.S. Army DEVCOM, Army Research Laboratory System for automated process substitution with connection-preserving capabilities
KR102657010B1 (ko) * 2023-12-04 2024-04-12 주식회사 심시스글로벌 샌드박스 기반의 가상 망 분리 방법 및 시스템
JP2025114170A (ja) * 2024-01-24 2025-08-05 株式会社Premo 感染通知送信装置、方法及びプログラム
US20250245318A1 (en) * 2024-01-29 2025-07-31 Mimic Networks, Inc. Isolated test environment for ransomware analysis
US20260032130A1 (en) * 2024-07-26 2026-01-29 Bank Of America Corporation System and method to dynamically generate synthetic structures in a virtual environment
CN119996025B (zh) * 2025-02-28 2025-10-17 广州大学 一种基于gpt的高交互蜜点设计方法及系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050166072A1 (en) * 2002-12-31 2005-07-28 Converse Vikki K. Method and system for wireless morphing honeypot
US20070240215A1 (en) * 2006-03-28 2007-10-11 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
CN101185063A (zh) * 2005-04-18 2008-05-21 纽约市哥伦比亚大学理事会 用于使用“蜜罐”检测和阻止攻击的系统和方法
CN101567887A (zh) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 一种漏洞拟真超载蜜罐方法
CN102088379A (zh) * 2011-01-24 2011-06-08 国家计算机网络与信息安全管理中心 基于沙箱技术的客户端蜜罐网页恶意代码检测方法与装置
CN103051615A (zh) * 2012-12-14 2013-04-17 陈晶 一种蜜场系统中抗大流量攻击的动态防御系统
CN103268448A (zh) * 2013-05-24 2013-08-28 北京网秦天下科技有限公司 动态检测移动应用的安全性的方法和系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8479286B2 (en) * 2009-12-15 2013-07-02 Mcafee, Inc. Systems and methods for behavioral sandboxing
ES2755780T3 (es) * 2011-09-16 2020-04-23 Veracode Inc Análisis estático y de comportamiento automatizado mediante la utilización de un espacio aislado instrumentado y clasificación de aprendizaje automático para seguridad móvil
US8739281B2 (en) * 2011-12-06 2014-05-27 At&T Intellectual Property I, L.P. Multilayered deception for intrusion detection and prevention
US9652362B2 (en) * 2013-12-06 2017-05-16 Qualcomm Incorporated Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050166072A1 (en) * 2002-12-31 2005-07-28 Converse Vikki K. Method and system for wireless morphing honeypot
CN101185063A (zh) * 2005-04-18 2008-05-21 纽约市哥伦比亚大学理事会 用于使用“蜜罐”检测和阻止攻击的系统和方法
US20070240215A1 (en) * 2006-03-28 2007-10-11 Blue Coat Systems, Inc. Method and system for tracking access to application data and preventing data exploitation by malicious programs
CN101567887A (zh) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 一种漏洞拟真超载蜜罐方法
CN102088379A (zh) * 2011-01-24 2011-06-08 国家计算机网络与信息安全管理中心 基于沙箱技术的客户端蜜罐网页恶意代码检测方法与装置
CN103051615A (zh) * 2012-12-14 2013-04-17 陈晶 一种蜜场系统中抗大流量攻击的动态防御系统
CN103268448A (zh) * 2013-05-24 2013-08-28 北京网秦天下科技有限公司 动态检测移动应用的安全性的方法和系统

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12140926B2 (en) 2019-02-28 2024-11-12 Nanotronics Imaging, Inc. Assembly error correction for assembly lines
US12449792B2 (en) 2019-06-24 2025-10-21 Nanotronics Imaging, Inc. Predictive process control for a manufacturing process
US12153412B2 (en) 2019-06-24 2024-11-26 Nanotronics Imaging, Inc. Predictive process control for a manufacturing process
CN110677408B (zh) * 2019-07-09 2021-07-09 腾讯科技(深圳)有限公司 攻击信息的处理方法和装置、存储介质及电子装置
CN110677408A (zh) * 2019-07-09 2020-01-10 腾讯科技(深圳)有限公司 攻击信息的处理方法和装置、存储介质及电子装置
CN110381045A (zh) * 2019-07-09 2019-10-25 腾讯科技(深圳)有限公司 攻击操作的处理方法和装置、存储介质及电子装置
CN110381045B (zh) * 2019-07-09 2021-06-15 腾讯科技(深圳)有限公司 攻击操作的处理方法和装置、存储介质及电子装置
US12111923B2 (en) 2019-10-08 2024-10-08 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
US12153408B2 (en) 2019-11-06 2024-11-26 Nanotronics Imaging, Inc. Systems, methods, and media for manufacturing processes
US12153401B2 (en) 2019-11-06 2024-11-26 Nanotronics Imaging, Inc. Systems, methods, and media for manufacturing processes
CN111308958B (zh) * 2019-11-14 2021-04-20 广州安加互联科技有限公司 一种基于蜜罐技术的cnc设备仿真方法、系统和工控蜜罐
CN111308958A (zh) * 2019-11-14 2020-06-19 广州安加互联科技有限公司 一种基于蜜罐技术的cnc设备仿真方法、系统和工控蜜罐
US12153668B2 (en) 2019-11-20 2024-11-26 Nanotronics Imaging, Inc. Securing industrial production from sophisticated attacks
US12155673B2 (en) 2019-12-19 2024-11-26 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
CN115136080A (zh) * 2020-02-28 2022-09-30 纳米电子成像有限公司 用于智能地仿真工厂控制系统和模拟响应数据的方法、系统和装置
US12111922B2 (en) 2020-02-28 2024-10-08 Nanotronics Imaging, Inc. Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
CN111431891A (zh) * 2020-03-20 2020-07-17 广州锦行网络科技有限公司 一种蜜罐部署方法
CN111541670A (zh) * 2020-04-17 2020-08-14 广州锦行网络科技有限公司 一种新型动态蜜罐系统
CN112039861A (zh) * 2020-08-20 2020-12-04 咪咕文化科技有限公司 风险识别方法、装置、电子设备和计算机可读存储介质
US11824894B2 (en) 2020-11-25 2023-11-21 International Business Machines Corporation Defense of targeted database attacks through dynamic honeypot database response generation
GB2616389A (en) * 2020-11-25 2023-09-06 Ibm Defense of targeted database attacks through dynamic honeypot database response generation
WO2022111268A1 (en) * 2020-11-25 2022-06-02 International Business Machines Corporation Defense of targeted database attacks through dynamic honeypot database response generation
CN112800417A (zh) * 2021-04-15 2021-05-14 远江盛邦(北京)网络安全科技股份有限公司 基于服务状态机的反馈式蜜罐系统的识别方法及系统
CN112800417B (zh) * 2021-04-15 2021-07-06 远江盛邦(北京)网络安全科技股份有限公司 基于服务状态机的反馈式蜜罐系统的识别方法及系统
CN113609483A (zh) * 2021-07-16 2021-11-05 山东云海国创云计算装备产业创新中心有限公司 一种服务器病毒处理的方法、装置、设备及可读介质
CN113609483B (zh) * 2021-07-16 2024-05-03 山东云海国创云计算装备产业创新中心有限公司 一种服务器病毒处理的方法、装置、设备及可读介质

Also Published As

Publication number Publication date
EP3375159A1 (en) 2018-09-19
WO2017083043A1 (en) 2017-05-18
BR112018009375A8 (pt) 2019-02-26
KR20180080227A (ko) 2018-07-11
BR112018009375A2 (pt) 2018-11-13
TW201717088A (zh) 2017-05-16
EP3375159B1 (en) 2020-03-18
US20170134405A1 (en) 2017-05-11
JP2018536932A (ja) 2018-12-13

Similar Documents

Publication Publication Date Title
EP3375159B1 (en) Dynamic honeypot system
KR102498168B1 (ko) 적응형 기계 학습 피처들을 가진 사이버 보안 시스템
US10540494B2 (en) Determining source of side-loaded software using an administrator server
US10762209B2 (en) Boot security
US11533622B2 (en) Quarantining fake, counterfeit, jailbroke, or rooted mobile devices in the cloud
US20130254880A1 (en) System and method for crowdsourcing of mobile application reputations
US20170206351A1 (en) Mobile device security monitoring and notification
US20130097659A1 (en) System and method for whitelisting applications in a mobile network environment
US20150180908A1 (en) System and method for whitelisting applications in a mobile network environment
US20130097203A1 (en) System and method for providing threshold levels on privileged resource usage in a mobile network environment
US20120233694A1 (en) Mobile malicious software mitigation
US10262137B1 (en) Security recommendations based on incidents of malware
US20140282908A1 (en) Intelligent agent for privacy and security
US10893058B1 (en) Malware detection and alerting for network connected devices based on traffic flow analysis on local network
US9693233B2 (en) Intelligent agent for privacy and security application
US9622081B1 (en) Systems and methods for evaluating reputations of wireless networks
US20240250983A1 (en) Detecting and mitigating bluetooth based attacks
US10609030B1 (en) Systems and methods for identifying untrusted devices in peer-to-peer communication
Ugus et al. A leaky bucket called smartphone
US11132447B1 (en) Determining security vulnerabilities of Internet of Things devices
US12495051B2 (en) Service level verification in distributed system
US20260122103A1 (en) Detecting and mitigating bluetooth based attacks
WO2013081521A1 (en) Monitoring traffic in a communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180731