Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for false response based on dynamic transformation and network security system and method

A dynamic transformation and false technology, applied in the field of network security, can solve the problems involving many modules, poor practicability and versatility, complex deployment, etc., and achieve the effect of widely promoting application value, maintaining security and stability, and defending against penetration attacks

Active Publication Date: 2019-03-22
北京卫达信息技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To a certain extent, the system can provide legality management and behavior audit of intranet resources, and prevent internal attacks and unauthorized access behaviors. However, due to the large number of modules involved and complex deployment, its practicability and versatility are poor.
[0007] In general, the existing detection methods for network penetration attacks cannot achieve good results in practical applications. definite

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for false response based on dynamic transformation and network security system and method
  • System and method for false response based on dynamic transformation and network security system and method
  • System and method for false response based on dynamic transformation and network security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0065] The difference between the false response system and the security system described in the second preferred embodiment of the present invention and the above-mentioned first preferred embodiment is only that the false response information generating unit 13 further includes a vulnerability information generating module 25, as attached Image 6 As shown, the user configuration information correspondingly includes a number of system vulnerability information that can be falsely responded to and the probability of each vulnerability information for a false response. The vulnerability information generation module 25 can perform false responses according to the user configuration information. A number of system vulnerability information and the probability of a false response to each vulnerability information, a number of vulnerability information corresponding to each IP address generated by the IP generation module 21 and the probability of a false response to each vulnerabil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a spurious response system and method based on dynamic variation and a network security system and method.The spurious response system comprises a spurious response information configuration unit and a spurious response unit, the spurious response information configuration unit configures spurious response information which can be varied dynamically and comprises a spurious IP address and a spurious MAC address at a minimum according to user configuration information, and the spurious response unit constructs a spurious response data packet and conducts spurious response on suspected scanning detection data packets according to the spurious response information.According to the spurious response system and method, spurious response is conducted on scanning detection behaviors of attackers, spurious response can be varied dynamically according to configuration, thereby the attackers cannot obtain the topological structure of a network and cannot accurately obtain real information of hosts in the network, in this way, network penetration attacking behaviors are effectively defended, and safety and stability of the network are maintained.

Description

Technical field [0001] The present invention relates to the field of network security, in particular to a false response system based on dynamic transformation, a false response method, a network security system and a network security defense method based on this. Background technique [0002] With the rapid development of computer networks and information technology, the global informatization process continues to accelerate, and the network plays an increasingly important role in today's society, becoming a national strategic resource covering important fields such as government, commerce, finance, and communications. At the same time, network security threats are also emerging. Attackers enter the network system through technical or social engineering methods to carry out information theft, system damage, malicious deception and other activities, which not only affect the work and life of ordinary people, but also become a threat. Major issues of economy, society and national ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 耿童童
Owner 北京卫达信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products