Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network masquerading method, apparatus, device, and computer-readable storage medium

A network camouflage and host technology, applied in the field of network security, can solve the problem of honeypot or honeynet easy to be seen by attackers, and achieve the effect of improving the simulation degree

Active Publication Date: 2022-07-12
上海沪景信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a network camouflage method, device, equipment and computer-readable storage medium, aiming to solve the technical problem that traditional honeypots or honeynets are easily seen through by attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network masquerading method, apparatus, device, and computer-readable storage medium
  • Network masquerading method, apparatus, device, and computer-readable storage medium
  • Network masquerading method, apparatus, device, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0085] Based on the first embodiment, a second embodiment of the network masquerading method of the present invention is proposed. In this embodiment, after step S10, the method further includes:

[0086] Step a, when receiving the second attack packet sent by the attacker, converting the fake address in the destination address of the second attack packet into the honeypot address of the honeypot;

[0087] Step b, sending the second attack packet to the honeypot;

[0088] Step c, after receiving a second response packet that matches the second attack packet, convert the address information in the source address of the second response packet into the masquerading address, and convert the second response to the second response packet. packets to the attacker.

[0089] In one embodiment, after receiving the first attack packet sent by the attacker, if the second attack packet sent by the same attacker is subsequently received, it means that the real host has successfully authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network masquerading method, device, equipment and computer-readable storage medium. The network masquerading method comprises the following steps: when a first attack packet sent by an attacker is received for the first time, the first attack packet is sent by an attacker for the first time. The masquerading address in the destination address is converted into the real address of the real host; the first attack packet is sent to the real host; when the first response packet matching the first attack packet is received, the The address information in the source address of the first response packet is converted into the fake address, and the first response packet is sent to the attacker. When the invention captures the first attack packet sent by the attacker, the destination address in the attack packet is converted into the real address of the real host, the attacker is directed to the real host, and the real host can accurately respond to the attacker, thereby improving the It improves the simulation degree of honeypot or honeynet, and solves the technical problem that traditional honeypot or honeynet is easy to be seen by attackers.

Description

technical field [0001] The present invention relates to the field of network security, and in particular, to a network masquerading method, apparatus, device and computer-readable storage medium. Background technique [0002] A honeypot is a security resource whose value lies in being scanned, attacked, and compromised. This definition indicates that the honeypot has no other practical role, so all network traffic to / from the honeypot may be indicative of scanning, attack, and compromise. Honeynet is a new concept gradually developed in honeypot technology, also known as trapping network, which consists of honeywall and several honeypots. Honeynet technology is essentially a kind of research-based high-interaction honeypot technology, whose main purpose is to collect attack information of hackers. But the difference from the traditional honeypot technology is that the honeynet constitutes a hacker trapping network architecture. [0003] Honeynet has three core requirement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1491H04L63/1416
Inventor 苏江明
Owner 上海沪景信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products