Security protection method and device for deploying honeypot in network and application
The invention provides a security protection method and device for deploying honeypots in a network, and an application, and relates to the technical field of information security. The method comprises the following steps: deploying at least one honeypot in a network to trap attackers in the network...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention provides a security protection method and device for deploying honeypots in a network, and an application, and relates to the technical field of information security. The method comprises the following steps: deploying at least one honeypot in a network to trap attackers in the network; the attacker comprises a user who carries out network attack after identity disguising; acquiring at least one piece of attack behavior information from an attacker from the honeypot; and analyzing the attack behavior information, adjusting a deployment strategy of the honeypot so as to carry out matching adjustment on the trapping capability of the honeypot, and obtaining data information of the attacker on the equipment held by the attacker. According to the method, the honeypot is deployed in the network to attract an attacker in the network to attack, and in the process that the honeypot is attacked by the network, the deployment strategy of the honeypot is continuously adjusted to ensure that the system obta |
---|