Security protection method and device for deploying honeypot in network and application

The invention provides a security protection method and device for deploying honeypots in a network, and an application, and relates to the technical field of information security. The method comprises the following steps: deploying at least one honeypot in a network to trap attackers in the network...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: QIAO LIANG, YOUNG TENG-SHAU
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention provides a security protection method and device for deploying honeypots in a network, and an application, and relates to the technical field of information security. The method comprises the following steps: deploying at least one honeypot in a network to trap attackers in the network; the attacker comprises a user who carries out network attack after identity disguising; acquiring at least one piece of attack behavior information from an attacker from the honeypot; and analyzing the attack behavior information, adjusting a deployment strategy of the honeypot so as to carry out matching adjustment on the trapping capability of the honeypot, and obtaining data information of the attacker on the equipment held by the attacker. According to the method, the honeypot is deployed in the network to attract an attacker in the network to attack, and in the process that the honeypot is attacked by the network, the deployment strategy of the honeypot is continuously adjusted to ensure that the system obta