Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for distributing patch

A patch and honeypot technology, applied in the field of network security, can solve problems such as inability to ensure computer system security, inability to adapt to large-scale network management, etc.

Active Publication Date: 2010-08-11
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For users with many machines, complicated manual patch installation can no longer adapt to the management of large-scale networks, and patch distribution tools such as SUS, WSUS, and SMS are easy to become targets of malicious code attacks, so they cannot ensure the security of computer systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for distributing patch
  • Method for distributing patch
  • Method for distributing patch

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Hereinafter, the present invention will be further described in detail in conjunction with the accompanying drawings and embodiments.

[0027] According to one embodiment of the present invention, a patch distribution method using honeypot technology is provided. By replacing the content of the attack message sent out by the honeypot, the method replaces harmful malicious code delivery with beneficial ones related to vulnerabilities. Patches are delivered and run on remote hosts, enabling targeted patch distribution. In this way, vulnerable hosts can be patched in time without introducing new attack traffic to the network.

[0028] Scanning worms are typical malicious codes that attack vulnerabilities. In this embodiment, the attack mechanism of scanning worms needs to be used for patch delivery. The propagation steps of mainstream scanning worms are as follows: figure 1 shown.

[0029] Step 1: The worm on the attack source host randomly generates a target IP address...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for distributing a patch, which comprises the following steps of: infecting a honeypot computer with scanning worms; and when the honeypot computer serving as an attack source attacks other computer systems, substituting malicious codes for attack activity with the patch and delivering the patch to a remote computer system which is attacked. Compared with the prior art, the invention provides a scheme for distributing the patch by using a scanning worm spreading mechanism, so that the patch can be accurately distributed and timely run and a relevant patch can be installed for the computer system in a network timely without introducing new attack traffic into the network. Meanwhile, the method is a patch distribution scheme which has a mechanism different from a conventional patch distribution tool, and can be used as a complement to the conventional patch distribution tool so as to install corresponding patches for more computer systems timely.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular, the present invention relates to a patch distribution method. Background technique [0002] At present, computers and the Internet have penetrated into people's daily life and become tools that people often use. However, the operating systems and application software used by most personal computers now contain system loopholes or software loopholes. The so-called system loopholes are loopholes in the operating system itself, and these loopholes may exist or be newly created after the operating system is installed or after the system patch is installed; the so-called software loopholes are loopholes introduced by users after installing software on the operating system, such as Commonly used chat software in China, such as QQ and MSN, mail software Foxmail and Outlook Express, media player software Baofengyingyin, Qianqianjingting, etc., all have software vulnerabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 崔翔郭莉郝志宇时金桥
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products