CN111669403A - Multi-drainage multi-trapping node deployment system - Google Patents

Multi-drainage multi-trapping node deployment system Download PDF

Info

Publication number
CN111669403A
CN111669403A CN202010589243.9A CN202010589243A CN111669403A CN 111669403 A CN111669403 A CN 111669403A CN 202010589243 A CN202010589243 A CN 202010589243A CN 111669403 A CN111669403 A CN 111669403A
Authority
CN
China
Prior art keywords
trapping
node
honeypot
nodes
drainage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010589243.9A
Other languages
Chinese (zh)
Inventor
吴建亮
胡鹏
梁其款
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jeeseen Network Technologies Co Ltd
Original Assignee
Guangzhou Jeeseen Network Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jeeseen Network Technologies Co Ltd filed Critical Guangzhou Jeeseen Network Technologies Co Ltd
Priority to CN202010589243.9A priority Critical patent/CN111669403A/en
Publication of CN111669403A publication Critical patent/CN111669403A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A multi-drainage multi-trapping-node deployment system is at least provided with a honeypot and a plurality of trapping nodes arranged corresponding to the honeypot, and the attack flow aiming at the trapping nodes is finally drained to the honeypot. The invention has the following beneficial effects: 1. the method realizes the mode of multiple drainage, saves the deployment cost, improves the coverage rate of trapping nodes, namely the coverage rate of honeypots in the region, and greatly increases the success rate of honeypot trapping. 2. The adoption of the iptables forwarding rule has strict guidance. 3. No matter which level of trap nodes are touched by an attacker, the attacker finally drains to the honeypots in an insensible mode through a plurality of heavy drains.

Description

Multi-drainage multi-trapping node deployment system
Technical Field
The invention relates to the technical field of honeypots, in particular to a multi-drainage multi-trapping node deployment system.
Background
Nowadays, honeypot technology has become a middle strength in the active defense field, and is a necessary part of the existing security defense systems of governments, enterprises and the like in a new period. The honeypot can actively detect the network attack event and complement the deficiency of the traditional security defense system in dealing with high-level network threats. Once an attacker enters an enterprise intranet, in order to realize successful trapping of the attacker by the honeypot, the authenticity of the honeypot itself needs to be ensured firstly, so that the attacker cannot know that the system to be attacked is actually the honeypot; secondly, the coverage rate of honeypots in an intranet environment is ensured, and the trapping success rate is higher when the ratio of the number of honeypots to the number of real assets in the area is higher. However, the cost of a single honeypot is relatively high, and in the existing honeypot deployment methods, a point-to-point deployment method is adopted, as shown in fig. 1, and in this way, under the condition that the number of honeypots is limited, the coverage rate cannot be guaranteed.
Therefore, it is necessary to provide a multi-drainage multi-trap node deployment system to solve the deficiencies of the prior art.
Disclosure of Invention
The invention aims to avoid the defects of the prior art and provide a multi-drainage multi-trapping node deployment system. The multi-drainage multi-trapping node deployment system has the advantages of simplicity and less occupied simulation resources.
The above object of the present invention is achieved by the following technical measures:
the utility model provides a many trap node deployment systems of drainage, be provided with a honeypot at least and with a plurality of trap nodes that honeypot corresponds the setting, the attack flow to the node of trapping finally drains to the honeypot.
Defining the number of trapping nodes as N, the number of honeypots as N, and there being N: n is more than or equal to 2.
The n trapping nodes are sequentially and serially drained, and the honeypot is used as the tail end.
The trapping nodes far away from the honeypot are taken as starting points, and n trapping nodes are sequentially defined as the A < th > node1Trapping node, item A2Trap node … …, item Ai-1Trapping node, item AiTrapping node, item Ai+1Trap node … …, item An-1Trapping node, item AnAnd (4) trapping nodes, wherein i is more than or equal to 2 and less than or equal to n.
Then the firsti-1The trapping node is defined as a previous stage trapping node, and A isiThe trap node defines the current trap node, and the A < th > isi+1The trap node defines a next level trap node.
And defining the attack traffic which is drained from the previous stage trapping node to the current trapping node as the previous stage attack traffic, and defining the attack traffic aiming at the current trapping node as the current attack traffic.
A (A) of1The trapping node drains the current attack traffic into the A < th > node2And trapping the nodes.
The current trapping node drains the current attack flow and the superior attack flow to the next-level trapping node, the A < th > stagenAnd the trapping node drains the current attack traffic and the superior attack traffic to the honeypot.
The n trapping nodes adopt a parallel drainage mode and take the honeypots as tail ends.
And the n trapping nodes respectively drain the attack traffic aiming at each trapping node to the honeypots.
And the n trapping nodes adopt a composite drainage mode and take the honeypots as tail ends.
Preferably, the composite drainage mode comprises a parallel drainage mode and a serial drainage mode.
When any trapping node has attack flow, the corresponding attack flow takes the honeypot as a terminal direction, and flows towards the honeypot in sequence in a single direction.
And the plurality of trapping nodes drain the attack traffic to a lower induction node or a honeypot through an iptables forwarding rule.
The multi-drainage multi-trapping-node deployment system is at least provided with a honeypot and a plurality of trapping nodes arranged corresponding to the honeypot, and the attack flow aiming at the trapping nodes is finally drained to the honeypot. The invention has the following beneficial effects: 1. the method realizes the mode of multiple drainage, saves the deployment cost, improves the coverage rate of trapping nodes, namely the coverage rate of honeypots in the region, and greatly increases the success rate of honeypot trapping. 2. The adoption of the iptables forwarding rule has strict guidance. 3. No matter which level of trap nodes are touched by an attacker, the attacker finally drains to the honeypots in an insensible mode through a plurality of heavy drains.
Drawings
The invention is further illustrated by means of the attached drawings, the content of which is not in any way limiting.
FIG. 1 is a schematic diagram of a prior art deployment system.
Fig. 2 is a schematic serial drainage diagram of a multi-drainage multi-trap node deployment system according to the present invention.
Fig. 3 is a schematic parallel drainage diagram of a multi-drainage multi-trap node deployment system according to the present invention.
Fig. 4 is a schematic diagram of a composite drainage manner of the multi-drainage multi-trap node deployment system according to embodiment 3.
Fig. 5 is a schematic diagram of a composite drainage manner of the multi-drainage multi-trap node deployment system according to embodiment 4.
Detailed Description
The technical solution of the present invention is further illustrated by the following examples.
Example 1.
A multi-drainage multi-trapping node deployment system, as shown in fig. 2, is provided with at least one honeypot and a plurality of trapping nodes corresponding to the honeypot, and finally drains the attack traffic directed at the trapping nodes to the honeypot.
The invention discloses a multi-drainage multi-trap node deployment system, wherein the number of trap nodes is defined as N, the number of honeypots is defined as N, and N: n is more than or equal to 2. The n trapping nodes are sequentially and serially drained, and the honeypot is used as the tail end.
The number of trap nodes in the embodiment is 3, that is, N is 3, and the number of honeypots is defined as 1, that is, N is 1. It should be noted that the number of trap nodes of the multi-drainage multi-trap node deployment system of the present invention is not limited to 3 in this example, and n may be any number of 2, 5, 6, 10, 100, etc.
The trapping nodes far away from the honeypot are taken as starting points, and n trapping nodes are sequentially defined as the A < th > node1Trapping node, item A2Trap node … …, item Ai-1Trapping node, item AiTrapping node, item Ai+1Trap node … …, item An-1Trapping node, item AnAnd (4) trapping nodes, wherein i is more than or equal to 2 and less than or equal to n.
Then the firsti-1The trapping node is defined as a previous stage trapping node, and A isiThe trap node defines the current trap node, and the A < th > isi+1The trap node defines a next level trap node.
And defining the attack traffic which is drained from the previous stage trapping node to the current trapping node as the previous stage attack traffic, and defining the attack traffic aiming at the current trapping node as the current attack traffic. A (A) of1The trapping node drains the current attack traffic into the A < th > node2And trapping the nodes. The current trapping node drains the current attack flow and the superior attack flow to the next-level trapping node, the A < th > stagenAnd the trapping node drains the current attack traffic and the superior attack traffic to the honeypot.
The invention is explained by taking the embodiment as an example, and three trap nodes are sequentially defined as A1Trapping node, item A2Trapping node and A3Trap the node, then let A1The trapping node is defined as a previous stage trapping node, and A is2The trap node defines the current trap node, and the A < th > is3The trapping node defines the next-level trapping node when attacking the A < th > order1When trapping nodes, A1Trapping nodes drain attacks to the A2Trap nodes, then A2The trapping node A is connected with1Attack diversion of trapping nodes, namely switching to the A-th level attack flow3Trapping nodes, and finally transferring all attack traffic into the honeypots.
According to the multi-drainage multi-trapping node deployment system, a plurality of trapping nodes drain attack flow to a lower-level induction node or a honeypot through an iptables forwarding rule.
The multi-drainage multi-trapping-node deployment system is at least provided with a honeypot and a plurality of trapping nodes which are arranged corresponding to the honeypot, and the attack flow aiming at the trapping nodes is finally drained to the honeypot. The invention has the following beneficial effects: 1. the method realizes the mode of multiple drainage, saves the deployment cost, improves the coverage rate of trapping nodes, namely the coverage rate of honeypots in the region, and greatly increases the success rate of honeypot trapping. 2. The adoption of the iptables forwarding rule has strict guidance. 3. No matter which level of trap nodes are touched by an attacker, the attacker finally drains to the honeypots in an insensible mode through a plurality of heavy drains.
Example 2.
A multi-drainage multi-trap node deployment system, as shown in fig. 3, with the other features the same as those of embodiment 1 except that: the n trapping nodes adopt a parallel drainage mode and take the honeypots as tail ends.
In this example, N is also 3 and N is also 1.
And the n trapping nodes respectively drain the attack traffic aiming at each trapping node to the honeypots.
The present invention is described by taking the embodiment as an example, when any one of the three trapping nodes is attacked, the attacking traffic is drained to the honeypot by the corresponding attacked trapping node.
The multi-drainage multi-trapping-node deployment system is at least provided with a honeypot and a plurality of trapping nodes which are arranged corresponding to the honeypot, and the attack flow aiming at the trapping nodes is finally drained to the honeypot. The invention has the following beneficial effects: 1. the method realizes the mode of multiple drainage, saves the deployment cost, improves the coverage rate of trapping nodes, namely the coverage rate of honeypots in the region, and greatly increases the success rate of honeypot trapping. 2. The adoption of the iptables forwarding rule has strict guidance. 3. No matter which level of trap nodes are touched by an attacker, the attacker finally drains to the honeypots in an insensible mode through a plurality of heavy drains.
Example 3.
A multi-drainage multi-trap node deployment system, as shown in fig. 4, with the other features the same as those of embodiment 1 except that: and the n trapping nodes adopt a composite drainage mode and take the honeypots as tail ends.
The composite drainage mode of the invention comprises a parallel drainage mode and a serial drainage mode.
When any trapping node has attack flow, the corresponding attack flow takes the honeypot as a terminal direction, and flows towards the honeypot in a single direction in sequence.
Specifically, the current trap node is stored in the previous stage trap node and the next stage trap node. When the current trapping node has attack flow, the trapping node drains the attack flow to the trapping node of the next stage, if the trapping node of the previous stage also has the attack flow, the trapping node of the previous stage also drains the attack flow to the trapping node of the next stage, and finally all the attack flows are sequentially drained towards the honeypot in a single direction.
Taking the example that the current trapping node only has the next-stage trapping node, when the current trapping node has attack traffic, the trapping node drains the attack traffic to the next-stage trapping node, and finally all the attack traffic is drained towards the honeypot in a single direction in sequence.
Taking the example that the current trapping node has the previous trapping node and is connected with the honeypot, when the current trapping node has attack traffic, and if the previous trapping node also has attack traffic, the current trapping node drains all the attack traffic and the previous attack traffic to the honeypot.
In this embodiment, 3 trapping nodes and 1 honeypot are taken as an example for explanation, two trapping nodes drain in parallel first, then the two trapping nodes drain in series with another honeypot, and finally the honeypot is taken as a terminal point, the two trapping nodes draining in parallel are defined as parallel trapping nodes, the other trapping node is defined as a series trapping node, when any one parallel trapping node is attacked, the attack traffic is introduced into the series trapping node, and finally the attack traffic is drained into the honeypot. If the serial trapping node is attacked, the serial trapping node directly drains the attacking traffic into the honeypot.
It should be noted that, this embodiment is only described with 3 trap nodes and 1 honeypot, and it is within the scope of the present invention for other numbers of trap nodes and honeypots to be in a composite drainage manner.
Example 4.
A multi-drainage multi-trap node deployment system, as shown in fig. 5, with the other features being the same as those of embodiment 3 except that: the present embodiment is provided with 7 trap nodes and 1 honeypot.
The 7 trapping nodes are named as a 1 st trapping node, a 2 nd trapping node, a 3 rd trapping node, a 4 th trapping node, a 5 th trapping node, a 6 th trapping node and a 7 th trapping node respectively.
The 1 st trapping node and the 2 nd trapping node drain in parallel and then drain in series with the 6 th trapping node respectively, the 3 rd trapping node, the 4 th trapping node and the 5 th trapping node drain in parallel and then drain in series with the 7 th trapping node respectively, the 6 th trapping node and the 7 th trapping node drain in parallel, and finally the 6 th trapping node and the 7 th trapping node are connected with the honeypot.
For example, when the 4 th trap node is attacked, the attack traffic flows into the 7 th trap node and then is drained to the honeypot. When the 6 th trapping node is attacked, the attack traffic is directly drained to the honeypot.
The multi-drainage multi-trapping-node deployment system is provided with a plurality of trapping nodes and a honeypot, wherein the plurality of trapping nodes are finally drained to the honeypot; the number of the trapping nodes is larger than that of the honeypots. The invention has the following beneficial effects: 1. the method realizes the mode of multiple drainage, saves the deployment cost, improves the coverage rate of trapping nodes, namely the coverage rate of honeypots in the region, and greatly increases the success rate of honeypot trapping. 2. The adoption of the iptables forwarding rule has strict guidance. 3. No matter which level of trap nodes are touched by an attacker, the attacker finally drains to the honeypots in an insensible mode through a plurality of heavy drains.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention and not for limiting the protection scope of the present invention, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. The utility model provides a many drainage trap node deployment system which characterized in that: at least one honeypot and a plurality of trapping nodes which are arranged corresponding to the honeypot are arranged, and the attack flow aiming at the trapping nodes is finally drained to the honeypot.
2. The multi-drainage multi-trap node deployment system of claim 1, wherein: defining the number of trapping nodes as N, the number of honeypots as N, and the existence of N: n is more than or equal to 2.
3. The multi-drainage multi-trap node deployment system of claim 1, wherein: the n trapping nodes are sequentially and serially drained, and the honeypot is used as the tail end.
4. The multi-drainage multi-trap node deployment system of claim 3, wherein: the trapping nodes far away from the honeypot are taken as starting points, and n trapping nodes are sequentially defined as the A < th > node1Trapping node, item A2Trap node … …, item Ai-1Trapping node, item AiTrapping node, item Ai+1Trap node … …, item An-1Trapping node, item AnTrapping nodes, wherein i is more than or equal to 2 and less than or equal to n;
then the firsti-1The trapping node is defined as a previous stage trapping node, and A isiThe trap node defines the current trap node, and the A < th > isi+1The trapping node defines a next-level trapping node;
defining the attack flow from the previous stage trapping node to the current trapping node as the previous stage attack flow, and defining the attack flow aiming at the current trapping node as the current attack flow;
a (A) of1The trapping node drains the current attack traffic into the A < th > node2Trapping nodes;
the current trapping node drains the current attack flow and the superior attack flow to the next-level trapping node, the A < th > stagenAnd the trapping node drains the current attack traffic and the superior attack traffic to the honeypot.
5. The multi-drainage multi-trap node deployment system of claim 1, wherein: the n trapping nodes adopt a parallel drainage mode and take the honeypots as tail ends.
6. The multi-drainage multi-trap node deployment system of claim 5, wherein: and the n trapping nodes respectively drain the attack traffic aiming at each trapping node to the honeypots.
7. The multi-drainage multi-trap node deployment system of claim 1, wherein: and the n trapping nodes adopt a composite drainage mode and take the honeypots as tail ends.
8. The multi-drainage multi-trap node deployment system of claim 7, wherein: the composite drainage mode comprises a parallel drainage mode and a serial drainage mode.
9. The multi-drainage multi-trap node deployment system of claim 8, wherein: when any trapping node has attack flow, the corresponding attack flow takes the honeypot as a terminal direction, and flows towards the honeypot in a single direction in sequence.
10. The multi-drainage multi-trap node deployment system according to any one of claims 1 to 9, wherein: and the plurality of trapping nodes drain the attack traffic to a lower induction node or a honeypot through an iptables forwarding rule.
CN202010589243.9A 2020-06-24 2020-06-24 Multi-drainage multi-trapping node deployment system Pending CN111669403A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010589243.9A CN111669403A (en) 2020-06-24 2020-06-24 Multi-drainage multi-trapping node deployment system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010589243.9A CN111669403A (en) 2020-06-24 2020-06-24 Multi-drainage multi-trapping node deployment system

Publications (1)

Publication Number Publication Date
CN111669403A true CN111669403A (en) 2020-09-15

Family

ID=72389851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010589243.9A Pending CN111669403A (en) 2020-06-24 2020-06-24 Multi-drainage multi-trapping node deployment system

Country Status (1)

Country Link
CN (1) CN111669403A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383511A (en) * 2020-10-27 2021-02-19 广州锦行网络科技有限公司 Flow forwarding method and system
CN113746810A (en) * 2021-08-13 2021-12-03 哈尔滨工大天创电子有限公司 Network attack inducing method, device, equipment and storage medium
CN114499915A (en) * 2021-09-28 2022-05-13 北京卫达信息技术有限公司 Trapping attack method, device and system combining virtual nodes and honeypots

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
US8726379B1 (en) * 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
CN106961442A (en) * 2017-04-20 2017-07-18 中国电子技术标准化研究院 A kind of network method for entrapping based on honey jar
US9906538B2 (en) * 2014-12-03 2018-02-27 Guardicore Ltd. Automatic network attack detection and remediation using information collected by honeypots
CN107809425A (en) * 2017-10-20 2018-03-16 杭州默安科技有限公司 A kind of honey jar deployment system
CN107911244A (en) * 2017-11-17 2018-04-13 华南理工大学 The multi-user's honey jar terminal system and its implementation that a kind of cloud net combines
CN109768993A (en) * 2019-03-05 2019-05-17 中国人民解放军32082部队 A kind of high covering Intranet honey pot system
CN109818933A (en) * 2018-12-29 2019-05-28 微梦创科网络科技(中国)有限公司 Catching method, device, system, equipment and the medium of attack
CN111147513A (en) * 2019-12-31 2020-05-12 广州锦行网络科技有限公司 Transverse moving attack path determination method in honey net based on attack behavior analysis

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8726379B1 (en) * 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
US9906538B2 (en) * 2014-12-03 2018-02-27 Guardicore Ltd. Automatic network attack detection and remediation using information collected by honeypots
CN106961442A (en) * 2017-04-20 2017-07-18 中国电子技术标准化研究院 A kind of network method for entrapping based on honey jar
CN107809425A (en) * 2017-10-20 2018-03-16 杭州默安科技有限公司 A kind of honey jar deployment system
CN107911244A (en) * 2017-11-17 2018-04-13 华南理工大学 The multi-user's honey jar terminal system and its implementation that a kind of cloud net combines
CN109818933A (en) * 2018-12-29 2019-05-28 微梦创科网络科技(中国)有限公司 Catching method, device, system, equipment and the medium of attack
CN109768993A (en) * 2019-03-05 2019-05-17 中国人民解放军32082部队 A kind of high covering Intranet honey pot system
CN111147513A (en) * 2019-12-31 2020-05-12 广州锦行网络科技有限公司 Transverse moving attack path determination method in honey net based on attack behavior analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
程杰仁: "基于代理的Honeypot系统关键技术研究与实现", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383511A (en) * 2020-10-27 2021-02-19 广州锦行网络科技有限公司 Flow forwarding method and system
CN113746810A (en) * 2021-08-13 2021-12-03 哈尔滨工大天创电子有限公司 Network attack inducing method, device, equipment and storage medium
CN114499915A (en) * 2021-09-28 2022-05-13 北京卫达信息技术有限公司 Trapping attack method, device and system combining virtual nodes and honeypots

Similar Documents

Publication Publication Date Title
CN111669403A (en) Multi-drainage multi-trapping node deployment system
Shukla ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things
CN107222491B (en) Intrusion detection rule creating method based on industrial control network variant attack
CN103023924A (en) Content distribution network based DDoS (distributed denial of service) attack protecting method and content distribution network based DDoS attack protecting system for cloud distribution platform
CN112087413A (en) Network attack intelligent dynamic protection and trapping system and method based on active detection
CN106027513A (en) Method for analyzing propagation characteristics of computer virus in SDN mobile environment
CN112769827B (en) Network attack agent end detection and tracing method and device
CN104378186A (en) Network redundant data processing methods, devices and system
Rajab et al. Countering burst header packet flooding attack in optical burst switching network
Luo et al. SDN/NFV-based security service function tree for cloud
CN108471382A (en) A kind of complex network clustering algorithm attack method based on node angle value
CN112751801B (en) Method, device and equipment for filtering denial of service attack based on IP white list
Houmer et al. Security analysis of vehicular ad-hoc networks based on attack tree
Paharia et al. DDoS Detection and Mitigation in cloud via FogFiter: a defence mechanism
Thai et al. On detection of malicious users using group testing techniques
CN114172697B (en) Method for defending IP address spoofing DDoS attack in high-speed network
Vhora et al. Rank Base Data Routing (RBDR) scheme using AOMDV: A proposed scheme for packet drop attack detection and prevention in MANET
US11394744B2 (en) DDOS-handling device, DDOS-handling method, and program
Mishra et al. Defensive approach using blockchain technology against distributed denial of service attacks
Xiao et al. NISp1-06: On intentional attacks and protections in complex communication networks
CN109547504B (en) Network intrusion detection and adaptive response method for mobile sensor
Shirley et al. Sub-botnet coordination using tokens in a switched network
Hu et al. Moving target defense based on adaptive forwarding path migration for securing the SCADA network
Kotsiuba et al. Technique for Finding and Investigating the Strongest Combinations of Cyberattacks on Smart Grid Infrastructure
Hunter et al. Tartarus: A honeypot based malware tracking and mitigation framework.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200915