Network attack tracing method and device for honeypot trapping based on reverse proxy

According to the reverse proxy-based honeypot trapping network attack tracing method and device, an attacker is forcibly hijacked to a honeypot by using an HTTP reverse proxy server, a new thought is provided for an existing honeypot-based defense method that the attacker passively treads thunder, a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WEI JIAHUI, LIU AN, LIU JUNWEN, ZHONG YI, WANG ZIMENG, XIA ANG, LI CHENGWEI, CAO YAOFU, ZHAO JINGCHENG, LU TENG, LIN BINGJIE, YAN JUNLU, LI HUIMIN, HU WEI, LI QINGBO, SHI JIN, LI XIAOMENG, ZHANG DE, GE HUI, CUI ZHAOWEI, ZHAI QU, ZHANG ZHENING, LIU MENGQI, CHENG JIE
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:According to the reverse proxy-based honeypot trapping network attack tracing method and device, an attacker is forcibly hijacked to a honeypot by using an HTTP reverse proxy server, a new thought is provided for an existing honeypot-based defense method that the attacker passively treads thunder, and active defense of a honeypot system is enhanced. When the visitor is identified as a normal user, a normal page is returned, and when the visitor is identified as an attacker, the attacker is guided to a honeypot page. Due to the fact that the normal page and the honeypot page are the same URL, different returns are given according to different behaviors of visitors, the possibility that an attacker bypasses the honeypot by distinguishing the URL is broken, and the possibility is provided for a business unit to trap hackers through active intervention; according to the method, more information clues are provided for attack traceability by utilizing a traceability code in a honeypot page and a highly imitated hon