Network masquerading method, apparatus, device, and computer-readable storage medium
A network camouflage and host technology, applied in the field of network security, can solve the problem of honeypot or honeynet easy to be seen by attackers, and achieve the effect of improving the simulation degree
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0085] Based on the first embodiment, a second embodiment of the network masquerading method of the present invention is proposed. In this embodiment, after step S10, the method further includes:
[0086] Step a, when receiving the second attack packet sent by the attacker, converting the fake address in the destination address of the second attack packet into the honeypot address of the honeypot;
[0087] Step b, sending the second attack packet to the honeypot;
[0088] Step c, after receiving a second response packet that matches the second attack packet, convert the address information in the source address of the second response packet into the masquerading address, and convert the second response to the second response packet. packets to the attacker.
[0089] In one embodiment, after receiving the first attack packet sent by the attacker, if the second attack packet sent by the same attacker is subsequently received, it means that the real host has successfully authent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com