CN111935193A - 基于伪装代理与动态技术相关联的自动化安全防护方法 - Google Patents
基于伪装代理与动态技术相关联的自动化安全防护方法 Download PDFInfo
- Publication number
- CN111935193A CN111935193A CN202011087361.6A CN202011087361A CN111935193A CN 111935193 A CN111935193 A CN 111935193A CN 202011087361 A CN202011087361 A CN 202011087361A CN 111935193 A CN111935193 A CN 111935193A
- Authority
- CN
- China
- Prior art keywords
- layer
- dynamic
- hacker
- portrait
- attacker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011087361.6A CN111935193B (zh) | 2020-10-13 | 2020-10-13 | 基于伪装代理与动态技术相关联的自动化安全防护方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011087361.6A CN111935193B (zh) | 2020-10-13 | 2020-10-13 | 基于伪装代理与动态技术相关联的自动化安全防护方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111935193A true CN111935193A (zh) | 2020-11-13 |
CN111935193B CN111935193B (zh) | 2021-01-19 |
Family
ID=73334457
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011087361.6A Active CN111935193B (zh) | 2020-10-13 | 2020-10-13 | 基于伪装代理与动态技术相关联的自动化安全防护方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111935193B (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565226A (zh) * | 2020-11-27 | 2021-03-26 | 深信服科技股份有限公司 | 请求处理方法、装置、设备及系统和用户画像生成方法 |
CN112613000A (zh) * | 2020-12-22 | 2021-04-06 | 中国建设银行股份有限公司 | 一种敏感信息保护方法、装置、电子设备及可读存储介质 |
CN112637175A (zh) * | 2020-12-17 | 2021-04-09 | 山东云天安全技术有限公司 | 一种用于工业物联网的防御方法及装置 |
CN113014598A (zh) * | 2021-03-20 | 2021-06-22 | 北京长亭未来科技有限公司 | 对机器人恶意攻击的防护方法、防火墙、电子设备和存储介质 |
CN113556356A (zh) * | 2021-07-30 | 2021-10-26 | 中国电子科技集团公司第五十四研究所 | 一种基于通信协议的服务软件特征隐藏方法及系统 |
CN114499926A (zh) * | 2021-12-13 | 2022-05-13 | 广东电力通信科技有限公司 | 一种智能web防护系统的动态防护方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170085577A1 (en) * | 2015-09-22 | 2017-03-23 | Lorraine Wise | Computer method for maintaining a hack trap |
CN110430190A (zh) * | 2019-08-05 | 2019-11-08 | 北京经纬信安科技有限公司 | 基于att&ck的欺骗性防御系统、构建方法及全链路防御实现方法 |
CN111680294A (zh) * | 2020-06-15 | 2020-09-18 | 杭州安恒信息技术股份有限公司 | 一种基于高交互蜜罐技术的数据库监控方法、装置、设备 |
CN111737688A (zh) * | 2020-06-08 | 2020-10-02 | 上海交通大学 | 基于用户画像的攻击防御系统 |
-
2020
- 2020-10-13 CN CN202011087361.6A patent/CN111935193B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170085577A1 (en) * | 2015-09-22 | 2017-03-23 | Lorraine Wise | Computer method for maintaining a hack trap |
CN110430190A (zh) * | 2019-08-05 | 2019-11-08 | 北京经纬信安科技有限公司 | 基于att&ck的欺骗性防御系统、构建方法及全链路防御实现方法 |
CN111737688A (zh) * | 2020-06-08 | 2020-10-02 | 上海交通大学 | 基于用户画像的攻击防御系统 |
CN111680294A (zh) * | 2020-06-15 | 2020-09-18 | 杭州安恒信息技术股份有限公司 | 一种基于高交互蜜罐技术的数据库监控方法、装置、设备 |
Non-Patent Citations (1)
Title |
---|
朱乐君等: "基于云蜜网的云平台内部安全能力建设", 《现代职业教育》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565226A (zh) * | 2020-11-27 | 2021-03-26 | 深信服科技股份有限公司 | 请求处理方法、装置、设备及系统和用户画像生成方法 |
CN112637175A (zh) * | 2020-12-17 | 2021-04-09 | 山东云天安全技术有限公司 | 一种用于工业物联网的防御方法及装置 |
CN112613000A (zh) * | 2020-12-22 | 2021-04-06 | 中国建设银行股份有限公司 | 一种敏感信息保护方法、装置、电子设备及可读存储介质 |
CN113014598A (zh) * | 2021-03-20 | 2021-06-22 | 北京长亭未来科技有限公司 | 对机器人恶意攻击的防护方法、防火墙、电子设备和存储介质 |
CN113556356A (zh) * | 2021-07-30 | 2021-10-26 | 中国电子科技集团公司第五十四研究所 | 一种基于通信协议的服务软件特征隐藏方法及系统 |
CN114499926A (zh) * | 2021-12-13 | 2022-05-13 | 广东电力通信科技有限公司 | 一种智能web防护系统的动态防护方法 |
Also Published As
Publication number | Publication date |
---|---|
CN111935193B (zh) | 2021-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111935193B (zh) | 基于伪装代理与动态技术相关联的自动化安全防护方法 | |
Dou et al. | A confidence-based filtering method for DDoS attack defense in cloud environment | |
Zhang et al. | ShuffleFL: Gradient-preserving federated learning using trusted execution environment | |
Lv et al. | Secure deep learning in defense in deep-learning-as-a-service computing systems in digital twins | |
Vidalis et al. | Assessing identity theft in the Internet of Things | |
Fang et al. | Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances | |
Jiang et al. | BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence | |
CN113507704A (zh) | 基于双重属性决策的移动群智感知隐私保护方法 | |
Lin et al. | Detection of application-layer tunnels with rules and machine learning | |
Hong et al. | [Retracted] Abnormal Access Behavior Detection of Ideological and Political MOOCs in Colleges and Universities | |
CN113886817A (zh) | 主机入侵检测方法及装置、电子设备、存储介质 | |
Veprytska et al. | AI powered attacks against AI powered protection: Classification, scenarios and risk analysis | |
Liu et al. | Spatial‐Temporal Feature with Dual‐Attention Mechanism for Encrypted Malicious Traffic Detection | |
Xu et al. | Attack identification for software-defined networking based on attack trees and extension innovation methods | |
Ahmed et al. | CCF based system framework in federated learning against data poisoning attacks | |
Bishtawi et al. | Cyber Security of mobile applications using artificial intelligence | |
CN116170192A (zh) | 基于深度学习的区块链网络入侵检测方法 | |
An et al. | An HTTP anomaly detection architecture based on the internet of intelligence | |
Hua et al. | Big data security and privacy protection model based on image encryption algorithm | |
Huang | Application of computer data mining technology based on AKN algorithm in denial of service attack defense detection | |
Cheng et al. | Universal interactive verification framework for federated learning protocol | |
Wang | Research on the method of network space security countermeasure drill | |
Yao et al. | A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge Computing | |
Cheng | [Retracted] Research on High Robust Multimedia Image Encryption Based on Gyrator Transform Domain Model | |
Fu et al. | An Improved Biometric Fuzzy Signature with Timestamp of Blockchain Technology for Electrical Equipment Maintenance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 2004, building 2, juhuiyuan, 108 Xuanwu Avenue, Xuanwu District, Nanjing City, Jiangsu Province Applicant after: Jiangsu Kaibo Technology Co.,Ltd. Address before: Room 2004, building 2, juhuiyuan, 108 Xuanwu Avenue, Xuanwu District, Nanjing City, Jiangsu Province Applicant before: Jiangsu Kaibo Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210531 Address after: Room 2004, building 2, juhuiyuan, 108 Xuanwu Avenue, Xuanwu District, Nanjing City, Jiangsu Province Patentee after: Jiangsu Kaibo Technology Co.,Ltd. Patentee after: Nanjing Kaibo Xinda Technology Co.,Ltd. Address before: Room 2004, building 2, juhuiyuan, 108 Xuanwu Avenue, Xuanwu District, Nanjing City, Jiangsu Province Patentee before: Jiangsu Kaibo Technology Co.,Ltd. |
|
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Building C18-2, Zidong International Creative Park, No. 2, Zidong Road, Maqun Street, Qixia District, Nanjing, Jiangsu, 210000 Patentee after: Jiangsu Kaibo Technology Co.,Ltd. Patentee after: Nanjing Yuyan Safety Technology Co.,Ltd. Address before: Room 2004, building 2, juhuiyuan, 108 Xuanwu Avenue, Xuanwu District, Nanjing City, Jiangsu Province Patentee before: Jiangsu Kaibo Technology Co.,Ltd. Patentee before: Nanjing Kaibo Xinda Technology Co.,Ltd. |