CN1322712C - 一种实现诱骗网络数据流重定向的方法 - Google Patents
一种实现诱骗网络数据流重定向的方法 Download PDFInfo
- Publication number
- CN1322712C CN1322712C CNB2004100448739A CN200410044873A CN1322712C CN 1322712 C CN1322712 C CN 1322712C CN B2004100448739 A CNB2004100448739 A CN B2004100448739A CN 200410044873 A CN200410044873 A CN 200410044873A CN 1322712 C CN1322712 C CN 1322712C
- Authority
- CN
- China
- Prior art keywords
- network
- datagram
- lan
- address
- suspicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100448739A CN1322712C (zh) | 2004-05-28 | 2004-05-28 | 一种实现诱骗网络数据流重定向的方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100448739A CN1322712C (zh) | 2004-05-28 | 2004-05-28 | 一种实现诱骗网络数据流重定向的方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1585346A CN1585346A (zh) | 2005-02-23 |
CN1322712C true CN1322712C (zh) | 2007-06-20 |
Family
ID=34601792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100448739A Expired - Fee Related CN1322712C (zh) | 2004-05-28 | 2004-05-28 | 一种实现诱骗网络数据流重定向的方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1322712C (zh) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100450080C (zh) * | 2005-05-17 | 2009-01-07 | 华为技术有限公司 | 收敛二层mac地址的方法及设备 |
JP4546402B2 (ja) * | 2006-01-23 | 2010-09-15 | Necディスプレイソリューションズ株式会社 | 装置制御システムおよび装置制御方法 |
US8219679B2 (en) * | 2006-02-28 | 2012-07-10 | International Business Machines Corporation | Detection and control of peer-to-peer communication |
CN101076013B (zh) * | 2006-05-19 | 2012-08-22 | 上海三零卫士信息安全有限公司 | 一种网络数据智能漂移引导系统及其数据漂移引导方法 |
CN101087196B (zh) * | 2006-12-27 | 2011-01-26 | 北京大学 | 多层次蜜网数据传输方法及系统 |
CN101325495B (zh) * | 2008-07-10 | 2012-02-01 | 成都市华为赛门铁克科技有限公司 | 一种应用于检测黑客服务器的检测方法、装置及系统 |
US8925080B2 (en) * | 2011-12-20 | 2014-12-30 | Sap Se | Deception-based network security using false positive responses to unauthorized access requests |
CN103051605B (zh) * | 2012-11-21 | 2016-06-29 | 国家计算机网络与信息安全管理中心 | 一种数据包处理方法、装置和系统 |
CN103905373B (zh) * | 2012-12-24 | 2018-02-16 | 珠海市君天电子科技有限公司 | 一种基于云端的拦截网络攻击的方法及其装置 |
CN103368972A (zh) * | 2013-07-26 | 2013-10-23 | 国家计算机网络与信息安全管理中心 | 基于诱导分析的高级网络攻击检测分析方法及其系统 |
CN104917729A (zh) * | 2014-03-12 | 2015-09-16 | 国基电子(上海)有限公司 | 网络设备及其防止地址解析协议报文攻击的方法 |
CN104883410B (zh) * | 2015-05-21 | 2018-03-02 | 上海沪景信息科技有限公司 | 一种网络传输方法和网络传输装置 |
CN105978916A (zh) * | 2016-07-19 | 2016-09-28 | 北京工业大学 | 一种sdn网络的安全审计系统 |
CN107332823A (zh) * | 2017-06-06 | 2017-11-07 | 北京明朝万达科技股份有限公司 | 一种基于机器学习的服务器伪装方法和系统 |
CN109996201B (zh) * | 2018-01-02 | 2021-01-15 | 中国移动通信有限公司研究院 | 一种网络访问方法及网络设备 |
CN109962912A (zh) * | 2019-03-06 | 2019-07-02 | 中国信息安全测评中心 | 一种基于蜜罐流量引流的防御方法及系统 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6654882B1 (en) * | 2002-05-24 | 2003-11-25 | Rackspace, Ltd | Network security system protecting against disclosure of information to unauthorized agents |
-
2004
- 2004-05-28 CN CNB2004100448739A patent/CN1322712C/zh not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6654882B1 (en) * | 2002-05-24 | 2003-11-25 | Rackspace, Ltd | Network security system protecting against disclosure of information to unauthorized agents |
Non-Patent Citations (5)
Title |
---|
ARP协议中安全性的研究 陈宜冬,哈尔滨理工大学学报,第8卷第3期 2003 * |
ARP协议中安全性的研究 陈宜冬,哈尔滨理工大学学报,第8卷第3期 2003;防Dos攻击算法的分析和实现 吉文华,于慧敏,计算机应用,第23卷第6期 2003;入侵诱骗模型的研究与建立 夏春和,吴震,赵勇,王海泉,计算机应用研究,第4期 2002;网络入侵检测与对抗的技术及实现 翟健宏,计算机工程,第30卷第5期 2004 * |
入侵诱骗模型的研究与建立 夏春和,吴震,赵勇,王海泉,计算机应用研究,第4期 2002 * |
网络入侵检测与对抗的技术及实现 翟健宏,计算机工程,第30卷第5期 2004 * |
防Dos攻击算法的分析和实现 吉文华,于慧敏,计算机应用,第23卷第6期 2003 * |
Also Published As
Publication number | Publication date |
---|---|
CN1585346A (zh) | 2005-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1322712C (zh) | 一种实现诱骗网络数据流重定向的方法 | |
Jansen | Intrusion detection with mobile agents | |
Libicki | Cyberdeterrence and cyberwar | |
Sandhu et al. | A survey of intrusion detection & prevention techniques | |
WO2020237124A1 (en) | Systems and methods for detecting and mitigating cyber security threats | |
CN110572412A (zh) | 云环境下基于入侵检测系统反馈的防火墙及其实现方法 | |
Osuagwu et al. | Mitigating social engineering for improved cybersecurity | |
Wanda et al. | A survey of intrusion detection system | |
Li et al. | The research and design of honeypot system applied in the LAN security | |
CN116132090B (zh) | 一种面向Web安全防护的欺骗防御系统 | |
CN101557394A (zh) | 一种蜜网主动防御系统中的数据控制方法 | |
Zhu et al. | Research on the security technology of big data information | |
Saed et al. | Detection of man in the middle attack using machine learning | |
Bartwal et al. | Security orchestration, automation, and response engine for deployment of behavioural honeypots | |
Rizvi et al. | Advocating for hybrid intrusion detection prevention system and framework improvement | |
Ahmad et al. | Performance analysis of intrusion detection systems for smartphone security enhancements | |
Vattikuti et al. | Ddos attack detection and mitigation using anomaly detection and machine learning models | |
Mehresh et al. | A deception framework for survivability against next generation cyber attacks | |
Yadav et al. | Comparative study of datasets used in cyber security intrusion detection | |
Li-Juan | Honeypot-based defense system research and design | |
Hutchinson et al. | Information Warfare: using the viable system model as a framework to attack organisations | |
Sibai et al. | Countering network-centric insider threats through self-protective autonomic rule generation | |
Teo et al. | Defeating internet attacks using risk awareness and active honeypots | |
Rana et al. | Honeypots in digital economy: an analysis of intrusion detection and prevention | |
Luo et al. | DDOS Defense Strategy in Software Definition Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Assignee: Shanghai Runxin Science & Technology Co., Ltd. Assignor: Nanjing Post & Telecommunication College Contract fulfillment period: 2007.11.16 to 2012.11.15 contract change Contract record no.: 2008990000506 Denomination of invention: Method for realizing chaff network data flow heavy orientation Granted publication date: 20070620 License type: Exclusive license Record date: 2008.9.26 |
|
LIC | Patent licence contract for exploitation submitted for record |
Free format text: EXCLUSIVE LICENCE; TIME LIMIT OF IMPLEMENTING CONTACT: 2007.11.16 TO 2012.11.15 Name of requester: SHANGHAI RUN XIN TECHNOLOGY CO., LTD. Effective date: 20080926 |
|
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070620 Termination date: 20120528 |