Method, device and system for generating data traffic

A technology of data flow and flow, which is applied in the field of data flow generation methods and devices, and systems, and can solve the problems of being unable to disperse the attacker's attention and the flow deception technology for the attacker to see through.

Active Publication Date: 2021-05-18
HILLSTONE NETWORKS CORP
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present application provides a method, device, and system for generating data traffic, so as to at least solve the technical prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for generating data traffic
  • Method, device and system for generating data traffic
  • Method, device and system for generating data traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0028] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and system for generating data traffic. The method comprises the following steps: acquiring whole-network data traffic, wherein the whole-network data traffic comprises real traffic of a network and deception-induced traffic, and the deception-induced traffic is used for being confused with the real traffic so as to reduce the probability of network attack success; analyzing the whole-network data traffic; determining whether to adjust the deception-induced traffic according to the analysis result; and generating target deception-induced traffic according to an adjustment result, and mixing the target deception-induced traffic with real traffic. According to the invention, the technical problem that an existing traffic spoofing technology confusing network attacks is easy to be broken by attackers and cannot disperse too much attention of the attackers is solved.

Description

technical field [0001] The present application relates to the field of network security, in particular, to a method, device, and system for generating data traffic. Background technique [0002] For enterprises, the network is usually divided into intranet and extranet. The intranet refers to the internal network of the enterprise, and the extranet refers to the Internet. The internal network usually has several outlets connected to the external network. Arrange border protection equipment such as firewalls and gateway equipment at the exit. With the popularization and development of the network, various network attack methods are constantly being introduced. It is difficult for border protection to completely block network attacks. Attackers can bypass border protection through various means, such as 0day vulnerabilities, social engineering and other means. [0003] If there is only border protection, once an attacker breaks into the intranet, they can unscrupulously de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1491Y02D30/50
Inventor 於大维王博
Owner HILLSTONE NETWORKS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products