Honeypot bait distribution method and device, storage medium and electronic equipment
A honeypot and decoy technology, applied in the field of network security, can solve problems such as low efficiency, lack of attack intention, inconvenient decoy deployment, etc., to achieve the effect of improving security and improving defense efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] The method embodiment provided in Embodiment 1 of the present application may be executed in a server, a computer, a honeypot host device, or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of a server in the embodiment of the present invention. like figure 1 As shown, the server can include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned server can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, the server may also include figure 1 more or fewer ...
Embodiment 2
[0099] In this embodiment, a honeypot decoy distributing device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that implements a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated.
[0100] Figure 5 is a structural block diagram of a honeypot decoy distribution device according to an embodiment of the present invention, as Figure 5 As shown, the device includes: an acquisition module 50, a generation module 52, and an allocation module 54, wherein,
[0101] An acquisition module 50, configured to acquire attack behavior data of network attack sources executing attack events;
[0102] A generating module 52, co...
Embodiment 3
[0116] The embodiment of the present application also provides an electronic device, Image 6 is a structural diagram of an electronic device according to an embodiment of the present invention, such as Image 6 As shown, it includes a processor 61, a communication interface 62, a memory 63 and a communication bus 64, wherein the processor 61, the communication interface 62, and the memory 63 complete mutual communication through the communication bus 64, and the memory 63 is used to store computer programs; The processor 61 is configured to implement the following steps when executing the program stored in the memory 63: acquire the attack behavior data of the attack event executed by the network attack source; generate the attack path of the attack event according to the attack behavior data, wherein the The attack path includes several key nodes attacked by the network attack source; honeypot decoys are distributed on the key nodes of the attack path.
[0117] Further, obt...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com