CN115567307A - Honeypot protection method and device - Google Patents
Honeypot protection method and device Download PDFInfo
- Publication number
- CN115567307A CN115567307A CN202211202967.9A CN202211202967A CN115567307A CN 115567307 A CN115567307 A CN 115567307A CN 202211202967 A CN202211202967 A CN 202211202967A CN 115567307 A CN115567307 A CN 115567307A
- Authority
- CN
- China
- Prior art keywords
- platform
- honeypot
- project
- data
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 96
- 230000002159 abnormal effect Effects 0.000 claims abstract description 122
- 238000001514 detection method Methods 0.000 claims description 69
- 230000006399 behavior Effects 0.000 claims description 55
- 235000012907 honey Nutrition 0.000 claims 7
- 230000002547 anomalous effect Effects 0.000 claims 2
- 230000005540 biological transmission Effects 0.000 description 48
- 230000006870 function Effects 0.000 description 24
- 238000010586 diagram Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000009471 action Effects 0.000 description 4
- 238000003062 neural network model Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 229940004975 interceptor Drugs 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本说明书实施例提供蜜罐防护方法以及装置,其中所述蜜罐防护方法包括:接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,识别客户端是否为异常访问客户端,若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,引导更深层访问,在识别到客户端为异常访问客户端时,将数据访问请求转发至蜜罐平台,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。
The embodiment of this specification provides a honeypot protection method and device, wherein the honeypot protection method includes: receiving a data access request sent by a client according to the project domain name, wherein the project platform and the honeypot platform have the same project domain name, and according to the data access request Request, identify whether the client is an abnormal access client, if so, forward the data access request to the honeypot platform, so that the client can access the honeypot platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, improve the camouflage of the honeypot platform, and guide deeper access. When the client is identified as an abnormal access client, it will Data access requests are forwarded to the honeypot platform, which avoids attacks on the project platform by abnormal access clients and protects the data security of the project platform.
Description
技术领域technical field
本说明书实施例涉及网络安全技术领域,特别涉及一种蜜罐防护方法。The embodiments of this specification relate to the technical field of network security, and in particular to a honeypot protection method.
背景技术Background technique
随着互联网技术的发展,越来越多的数据都部署在项目平台上,异常访问客户端对项目平台进行破坏、数据获取、数据更改等行为,造成严重的数据安全问题。With the development of Internet technology, more and more data are deployed on the project platform, and abnormal access clients can destroy the project platform, obtain data, change data, etc., causing serious data security problems.
目前,设置具有漏洞的仿项目平台,即蜜罐平台。利用蜜罐平台诱导异常访问客户端对其进行攻击,避免项目平台受到攻击,并通过收集异常访问客户端在蜜罐平台中的攻击行为事件,对异常访问客户端进行预防和溯源,保护了项目平台上数据的安全。At present, a fake project platform with loopholes, that is, a honeypot platform, is set up. Use the honeypot platform to induce abnormal access clients to attack it, avoid the project platform from being attacked, and prevent and trace the abnormal access clients by collecting the attack behavior events of the abnormal access clients in the honeypot platform, thus protecting the project Security of data on the platform.
然而,在蜜罐平台的伪装性不足的情况下,异常访问客户端识别出蜜罐平台,避免对蜜罐平台进行数据访问,无法收集到异常访问客户端在蜜罐平台中的攻击行为事件,从而无法对异常访问客户端进行预防和溯源,降低了项目平台的数据安全。因此,亟需一种高伪装性且可以提升项目平台的数据安全的蜜罐防护方法。However, when the camouflage of the honeypot platform is insufficient, the abnormal access client can identify the honeypot platform, avoid data access to the honeypot platform, and cannot collect the attack behavior events of the abnormal access client on the honeypot platform. As a result, it is impossible to prevent and trace the source of abnormal access clients, which reduces the data security of the project platform. Therefore, there is an urgent need for a honeypot protection method that is highly camouflaged and can improve the data security of the project platform.
发明内容Contents of the invention
有鉴于此,本说明书实施例提供了一种蜜罐防护方法。本说明书一个或者多个实施例同时涉及一种蜜罐防护装置,一种计算设备,一种计算机可读存储介质以及一种计算机程序,以解决现有技术中存在的技术缺陷。In view of this, the embodiment of this specification provides a honeypot protection method. One or more embodiments of this specification also relate to a honeypot protection device, a computing device, a computer-readable storage medium and a computer program, so as to solve technical defects in the prior art.
根据本说明书实施例的第一方面,提供了一种蜜罐防护方法,应用于项目平台上集成的访问控制组件,包括:According to the first aspect of the embodiment of this specification, a honeypot protection method is provided, which is applied to the access control component integrated on the project platform, including:
接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名;Receive the data access request sent by the client according to the project domain name, where the project platform and the honeypot platform have the same project domain name;
根据数据访问请求,识别客户端是否为异常访问客户端;According to the data access request, identify whether the client is an abnormal access client;
若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。If so, forward the data access request to the honeypot platform, so that the client can access the honeypot platform.
根据本说明书实施例的第二方法,提供了一种蜜罐防护方法,应用于蜜罐平台,包括:According to the second method of the embodiment of this specification, a honeypot protection method is provided, which is applied to a honeypot platform, including:
接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名;Receive the data access request forwarded by the project platform, where the data access request is sent by the client to the project platform according to the project domain name, and the project platform and the honeypot platform have the same project domain name;
根据数据访问请求,获取对应的蜜饵数据;Obtain the corresponding honeybait data according to the data access request;
将蜜饵数据反馈给项目平台。Feedback the honeybait data to the project platform.
根据本说明书实施例的第三方面,提供了一种蜜罐防护系统,包括项目平台和蜜罐平台,项目平台集成有访问控制组件,包括:According to the third aspect of the embodiment of this specification, a honeypot protection system is provided, including a project platform and a honeypot platform, and the project platform is integrated with an access control component, including:
访问控制组件,用于接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名;根据数据访问请求,识别客户端是否为异常访问客户端;若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问;The access control component is used to receive the data access request sent by the client according to the project domain name, wherein the project platform and the honeypot platform have the same project domain name; according to the data access request, identify whether the client is an abnormal access client; if so, then Forward the data access request to the honeypot platform so that the client can access the honeypot platform;
蜜罐平台,用于接收项目平台转发的数据访问请求;根据数据访问请求,获取对应的蜜饵数据;将蜜饵数据反馈给项目平台。The honeypot platform is used to receive the data access request forwarded by the project platform; obtain the corresponding honeybait data according to the data access request; and feed back the honeybait data to the project platform.
根据本说明书实施例的第四方面,提供了一种访问控制组件,访问控制组件集成于项目平台上,包括:According to the fourth aspect of the embodiment of this specification, an access control component is provided, and the access control component is integrated on the project platform, including:
第一接收模块,被配置为接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名;The first receiving module is configured to receive the data access request sent by the client according to the project domain name, wherein the project platform and the honeypot platform have the same project domain name;
识别模块,被配置为根据数据访问请求,识别客户端是否为异常访问客户端;The identification module is configured to identify whether the client is an abnormal access client according to the data access request;
转发模块,被配置为若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。The forwarding module is configured to forward the data access request to the honeypot platform so that the client can access the honeypot platform.
根据本说明书实施例的第五方面,提供了一种蜜罐防护装置,应用于蜜罐平台,包括:According to the fifth aspect of the embodiments of this specification, a honeypot protection device is provided, which is applied to a honeypot platform, including:
第二接收模块,被配置为接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名;The second receiving module is configured to receive the data access request forwarded by the project platform, wherein the data access request is sent to the project platform by the client according to the project domain name, and the project platform and the honeypot platform have the same project domain name;
获取模块,被配置为根据数据访问请求,获取对应的蜜饵数据;The obtaining module is configured to obtain corresponding honeybait data according to the data access request;
反馈模块,被配置为将蜜饵数据反馈给项目平台。The feedback module is configured to feed back the honeybait data to the project platform.
根据本说明书实施例的第六方面,提供了一种计算设备,包括:According to a sixth aspect of the embodiments of this specification, a computing device is provided, including:
存储器和处理器;memory and processor;
所述存储器用于存储计算机可执行指令,所述处理器用于执行所述计算机可执行指令,该计算机可执行指令被处理器执行时实现上述蜜罐防护方法的步骤。The memory is used to store computer-executable instructions, and the processor is used to execute the computer-executable instructions. When the computer-executable instructions are executed by the processor, the steps of the above honeypot protection method are realized.
根据本说明书实施例的第七方面,提供了一种计算机可读存储介质,其存储有计算机可执行指令,该指令被处理器执行时实现上述蜜罐防护方法的步骤。According to a seventh aspect of the embodiments of this specification, there is provided a computer-readable storage medium, which stores computer-executable instructions, and when the instructions are executed by a processor, the steps of the above honeypot protection method are implemented.
根据本说明书实施例的第八方面,提供了一种计算机程序,其中,当所述计算机程序在计算机中执行时,令计算机执行上述蜜罐防护方法的步骤。According to an eighth aspect of the embodiments of the present specification, a computer program is provided, wherein, when the computer program is executed in a computer, it causes the computer to execute the steps of the above honeypot protection method.
本说明书一个或多个实施例中,接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,识别客户端是否为异常访问客户端,若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,引导更深层访问,在识别到客户端为异常访问客户端时,将数据访问请求转发至蜜罐平台,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。In one or more embodiments of this specification, the data access request sent by the client according to the project domain name is received, wherein the project platform and the honeypot platform have the same project domain name, and according to the data access request, it is identified whether the client is an abnormal access client , if so, forward the data access request to the honeypot platform, so that the client can access the honeypot platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform and guides deeper access. When the client is identified as an abnormal access client, it will Data access requests are forwarded to the honeypot platform, which avoids attacks on the project platform by abnormal access clients and protects the data security of the project platform.
附图说明Description of drawings
图1是本说明书一个实施例提供的一种蜜罐防护系统的架构示意图;Fig. 1 is a schematic diagram of the architecture of a honeypot protection system provided by an embodiment of this specification;
图2是本说明书一个实施例提供的一种蜜罐防护方法的流程图;Fig. 2 is the flowchart of a kind of honeypot protection method that an embodiment of this description provides;
图3是本说明书一个实施例提供的另一种蜜罐防护方法的流程图;Fig. 3 is the flow chart of another kind of honeypot protection method that an embodiment of this specification provides;
图4是本说明书一个实施例提供的一种应用于web应用数据的蜜罐防护方法的处理过程流程图;Fig. 4 is a processing flow chart of a honeypot protection method applied to web application data provided by an embodiment of this specification;
图5是本说明书一个实施例提供的一种蜜罐防护系统的结构示意图;Fig. 5 is a schematic structural diagram of a honeypot protection system provided by an embodiment of this specification;
图6是本说明书一个实施例提供的一种访问控制组件的结构示意图;Fig. 6 is a schematic structural diagram of an access control component provided by an embodiment of this specification;
图7是本说明书一个实施例提供的一种蜜罐防护装置的结构示意图;Fig. 7 is a schematic structural diagram of a honeypot protection device provided by an embodiment of this specification;
图8是本说明书一个实施例提供的一种计算设备的结构框图。Fig. 8 is a structural block diagram of a computing device provided by an embodiment of this specification.
具体实施方式detailed description
在下面的描述中阐述了很多具体细节以便于充分理解本说明书。但是本说明书能够以很多不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本说明书内涵的情况下做类似推广,因此本说明书不受下面公开的具体实施的限制。In the following description, numerous specific details are set forth in order to provide a thorough understanding of the specification. However, this specification can be implemented in many other ways different from those described here, and those skilled in the art can make similar extensions without violating the connotation of this specification, so this specification is not limited by the specific implementations disclosed below.
在本说明书一个或多个实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书一个或多个实施例。在本说明书一个或多个实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本说明书一个或多个实施例中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。Terms used in one or more embodiments of this specification are for the purpose of describing specific embodiments only, and are not intended to limit one or more embodiments of this specification. As used in one or more embodiments of this specification and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and/or" used in one or more embodiments of the present specification refers to and includes any or all possible combinations of one or more associated listed items.
应当理解,尽管在本说明书一个或多个实施例中可能采用术语第一、第二等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书一个或多个实施例范围的情况下,第一也可以被称为第二,类似地,第二也可以被称为第一。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。It should be understood that although the terms first, second, etc. may be used to describe various information in one or more embodiments of the present specification, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, the first may also be referred to as the second, and similarly, the second may also be referred to as the first without departing from the scope of one or more embodiments of the present specification. Depending on the context, the word "if" as used herein may be interpreted as "at" or "when" or "in response to a determination."
首先,对本说明书一个或多个实施例涉及的名词术语进行解释。First, terms and terms involved in one or more embodiments of this specification are explained.
蜜罐平台:一种对异常访问客户端进行诱导攻击的技术,通过部署一定的蜜饵数据,诱导异常访问客户端对获取蜜饵数据来进行攻击,在异常访问客户端对蜜罐平台进行攻击的过程中,蜜罐平台收集异常访问客户端的攻击行为事件来分析,提高对异常访问客户端的预防能力和应对能力,保护了实际项目平台的数据安全。蜜罐平台与项目平台具有高相似性,即在异常访问客户端在蜜罐平台上进行数据访问时,难以感知到两者之间的差异。Honeypot platform: a technology for inducing attacks on abnormal access clients. By deploying certain honeybait data, it induces abnormal access clients to obtain honeybait data to attack, and attacks the honeypot platform on abnormal access clients. During the process, the honeypot platform collects and analyzes the attack behavior events of abnormal access clients, improves the ability to prevent and respond to abnormal access clients, and protects the data security of the actual project platform. The honeypot platform has a high similarity with the project platform, that is, when the abnormal access client accesses data on the honeypot platform, it is difficult to perceive the difference between the two.
域名:一串用点分隔的名字组成的Internet上某一个终端或者一组终端的名称,用于在数据传输时对终端进行定位标识。域名与终端的IP(Internet Protocol,互联网协议)地址具有对应关系。Domain name: A string of dot-separated names consisting of a certain terminal or a group of terminal names on the Internet, used to locate and identify terminals during data transmission. There is a corresponding relationship between the domain name and the IP (Internet Protocol, Internet Protocol) address of the terminal.
URL(Uniform Resource Locator,统一资源定位字符):是互联网中的万维网服务程序上用于指定信息位置的表示方法。URL (Uniform Resource Locator, Uniform Resource Locator): It is a representation method used to specify the location of information on the World Wide Web service program in the Internet.
接口:一种在代码开发过程中,封装了数据访问方法的类模块。客户端通过接口可以实现对数据库、功能节点等的数据访问。Interface: A class module that encapsulates data access methods during code development. The client can realize data access to the database, function nodes, etc. through the interface.
目前,蜜罐平台根据其交互性可以分为低交互蜜罐平台、高交互蜜罐平台、甚至纯蜜罐平台。高交互蜜罐平台通过模拟真实项目平台与客户端的交互过程,与异常访问客户端进行仿项目平台交互过程的交互,异常访问客户端更容易被诱导,进行更深入的数据访问,在一定程度上提升了蜜罐平台的伪装性。由于异常访问客户端在高交互蜜罐平台中进行更深入的数据访问,高交互蜜罐平台可以收集到更多的攻击行为事件,对攻击行为和异常访问客户端进行更深层次的分析,相比于低交互蜜罐平台和纯蜜罐平台,提升了对异常访问客户端进行预防和溯源能力,更有效保护了项目平台的数据安全。At present, honeypot platforms can be divided into low-interaction honeypot platforms, high-interaction honeypot platforms, and even pure honeypot platforms according to their interactivity. The high-interaction honeypot platform simulates the interaction process between the real project platform and the client, and interacts with the abnormal access client to imitate the interaction process of the project platform. The abnormal access client is more likely to be induced to perform more in-depth data access. Improved the camouflage of the honeypot platform. Due to the deeper data access of abnormal access clients in the high-interaction honeypot platform, the high-interaction honeypot platform can collect more attack behavior events, and conduct deeper analysis on attack behavior and abnormal access clients. Based on the low-interaction honeypot platform and pure honeypot platform, the ability to prevent and trace abnormal access clients is improved, and the data security of the project platform is more effectively protected.
虽然高交互蜜罐平台相比低交互蜜罐平台和纯蜜罐平台有一定优点,然而,由于高交互蜜罐平台仍然采用单独部署,其接收数据访问请求的方式是通过预设的域名或者端口接收客户端发送的数据访问请求,这使得域名或者端口与高交互蜜罐平台之间具有一一对应的特点,异常访问客户端可以利用这种一一对应的特点,利用域名或者端口标记蜜罐平台,避免访问标记域名或者标记端口对应的高交互蜜罐平台,使得高交互蜜罐平台伪装性不足,从而无法收集到异常访问客户端在高交互蜜罐平台中的攻击行为事件,无法对异常访问客户端进行预防和溯源,降低了项目平台的数据安全。Although the high-interaction honeypot platform has certain advantages compared with the low-interaction honeypot platform and the pure honeypot platform, however, because the high-interaction honeypot platform is still deployed separately, the way to receive data access requests is through the preset domain name or port Receive the data access request sent by the client, which makes the domain name or port have a one-to-one correspondence with the high-interaction honeypot platform. Abnormal access clients can use this one-to-one correspondence to mark the honeypot with the domain name or port Platform, avoid accessing the high-interaction honeypot platform corresponding to the marked domain name or marked port, which makes the high-interaction honeypot platform insufficiently camouflaged, so that it is impossible to collect the attack behavior events of the abnormal access client in the high-interaction honeypot platform, and it is impossible to analyze the abnormal Accessing the client for prevention and traceability reduces the data security of the project platform.
针对上述问题,在本说明书中,提供了一种蜜罐防护方法,本说明书同时涉及一种蜜罐防护系统,一种计算设备,以及一种计算机可读存储介质,在下面的实施例中逐一进行详细说明。In view of the above problems, in this specification, a honeypot protection method is provided. This specification also relates to a honeypot protection system, a computing device, and a computer-readable storage medium. In the following embodiments, one by one Describe in detail.
参见图1,图1示出了本说明书一个实施例提供的一种蜜罐防护系统的架构示意图。Referring to FIG. 1 , FIG. 1 shows a schematic diagram of a honeypot protection system provided by an embodiment of this specification.
如图1所示,蜜罐防护系统包括项目平台、蜜罐平台和云服务端,其中,项目平台上集成有访问控制组件,项目平台上部署有项目数据。项目平台上设置有多个项目端,蜜罐平台上设置有多个蜜罐代理端。As shown in Figure 1, the honeypot protection system includes a project platform, a honeypot platform, and a cloud server, where access control components are integrated on the project platform, and project data is deployed on the project platform. Multiple project terminals are set on the project platform, and multiple honeypot agent terminals are set on the honeypot platform.
客户端向项目平台发送数据访问请求。访问控制组件对数据访问请求进行拦截,根据该数据访问请求,判断客户端为正常访问客户端或者异常访问客户端。在客户端为正常访问客户端的情况下,根据数据访问请求获取项目数据,在客户端为异常访问客户端的情况下,将数据访问请求转发至蜜罐平台。在将数据访问请求转发至蜜罐平台后,蜜罐平台收集客户端的攻击行为事件,将攻击行为事件发送至云服务端,云服务端根据攻击行为事件生成检测策略,并将检测策略发送至访问控制组件,使得访问控制组件根据检测策略对客户端进行判断。The client sends a data access request to the project platform. The access control component intercepts the data access request, and judges whether the client is a normal access client or an abnormal access client according to the data access request. When the client is a normal access client, the project data is obtained according to the data access request, and when the client is an abnormal access client, the data access request is forwarded to the honeypot platform. After forwarding the data access request to the honeypot platform, the honeypot platform collects the attack behavior events of the client and sends the attack behavior events to the cloud server. The cloud server generates a detection strategy based on the attack behavior events and sends the detection strategy to the access The control component enables the access control component to judge the client according to the detection policy.
参见图2,图2示出了本说明书一个实施例提供的一种蜜罐防护方法的流程图,该方法应用于项目平台上集成的访问控制组件,具体包括以下步骤。Referring to Fig. 2, Fig. 2 shows a flow chart of a honeypot protection method provided by an embodiment of this specification, the method is applied to the access control component integrated on the project platform, and specifically includes the following steps.
步骤202:接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名。Step 202: Receive the data access request sent by the client according to the project domain name, wherein the project platform and the honeypot platform have the same project domain name.
本说明书实施例应用于项目平台上集成的访问控制组件,由于访问控制组件集成在项目平台上,即客户端为了进行数据访问,需要向项目平台发送数据访问请求,访问控制组件在识别客户端为异常访问客户端后,将数据访问请求转发至蜜罐平台,实现了蜜罐平台与真实项目在数据访问部分深度集成的同时,数据之间进行了解耦,避免了异常访问客户端获取项目数据的同时,无法感知到对蜜罐平台进行了数据访问,提升了蜜罐平台的伪装性,保护了项目平台的数据安全。The embodiment of this specification is applied to the access control component integrated on the project platform. Since the access control component is integrated on the project platform, that is, the client needs to send a data access request to the project platform in order to perform data access. The access control component identifies the client as After abnormal access to the client, the data access request is forwarded to the honeypot platform, which realizes the deep integration of the honeypot platform and the real project in the data access part, and at the same time decouples the data, preventing the abnormal access client from obtaining project data At the same time, it is impossible to perceive data access to the honeypot platform, which improves the camouflage of the honeypot platform and protects the data security of the project platform.
项目平台为部署在网络系统中、部署有项目数据的数据服务平台。例如,某应用程序或者网站的项目数据服务器,某机构的项目数据库等。项目平台包括多个项目端,每个项目端对应于特定的数据访问功能,例如,客户端需要访问项目平台上的地理数据,即对地理数据所在的项目端进行数据访问,来得到地理数据。The project platform is a data service platform deployed in the network system and deployed with project data. For example, a project data server of an application or a website, a project database of an institution, etc. The project platform includes multiple project ends, and each project end corresponds to a specific data access function. For example, the client needs to access geographic data on the project platform, that is, access the project end where the geographic data is located to obtain geographic data.
访问控制组件为具有流量拦截、流量分析和流量转发等功能的访问流量的控制组件,访问控制组件可以为具有上述功能的集成硬件,也可以为具有上述功能的集成虚拟功能模块,例如,设置在项目平台流量入口处的流量拦截器(Interceptor)。访问控制组件不具备处理项目数据的功能。访问控制组件上预先设置有多个接口,各接口对应数据访问请求中的数据类型,将数据访问请求进行流量转发。访问控制组件对所有发送给项目平台的数据访问请求进行拦截和分析,在完成分析后对应转发至项目平台或者蜜罐平台。由于访问控制组件是集成在项目平台上的,对于访问项目平台的客户端而言,只能确认数据访问请求发送给了项目平台,而无法确认具体发送给某个具体端口,就无法分辨后续进行数据访问的对象是项目平台还是蜜罐平台。The access control component is a control component for access traffic with functions such as traffic interception, traffic analysis, and traffic forwarding. The access control component can be integrated hardware with the above functions, or an integrated virtual function module with the above functions. For example, set in The traffic interceptor (Interceptor) at the traffic entrance of the project platform. The access control component has no functionality for processing project data. Multiple interfaces are preset on the access control component, each interface corresponds to the data type in the data access request, and forwards the data access request. The access control component intercepts and analyzes all data access requests sent to the project platform, and forwards them to the project platform or honeypot platform after the analysis is completed. Since the access control component is integrated on the project platform, for the client accessing the project platform, it can only confirm that the data access request is sent to the project platform, but cannot confirm that the data access request is sent to a specific port, so it is impossible to distinguish the follow-up Whether the object of data access is the project platform or the honeypot platform.
项目域名为项目平台对外开放的项目数据的访问域名,例如,对于网站“ABC”,其对外开放的项目数据的访问域名为“www.ABC.com”,“www.ABC.com/80”,“www.ABC.com/21”等。其中“80”为网站“ABC”预设的HTTP(Hyper Text Transfer Protocol,超文本传输协议)访问端口,“21”为网站“ABC”预设的FTP(File Transfer Protocol,文件传输协议)的访问端口,客户端通过上述域名进行访问,都会被访问控制组件进行流量拦截和流量分析。项目平台与蜜罐平台的项目域名是相同的,对于客户端只能感知到通过项目域名发送了数据访问请求,即无法对应确定是对项目平台还是对蜜罐平台发送了数据访问请求。The project domain name is the access domain name of the project data open to the public on the project platform. For example, for the website "ABC", the access domain name of the project data open to the public is "www.ABC.com", "www.ABC.com/80", "www.ABC.com/21" etc. Among them, "80" is the HTTP (Hyper Text Transfer Protocol, hypertext transfer protocol) access port preset by the website "ABC", and "21" is the FTP (File Transfer Protocol, file transfer protocol) access preset by the website "ABC". port, the client accesses through the above domain names, and the access control component will conduct traffic interception and traffic analysis. The project domain name of the project platform and the honeypot platform are the same, and the client can only perceive that the data access request is sent through the project domain name, that is, it cannot be determined whether the data access request is sent to the project platform or the honeypot platform.
数据访问请求为客户端发送给项目平台的请求进行项目数据访问的网络传输数据,数据访问请求包括客户端的信息、项目数据的信息、数据访问方式、传输网络信息等访问子信息。客户端的信息为客户端的标识信息,包括客户端IP地址、客户端Mac地址、客户端地理定位等;项目数据的信息为项目数据的标识信息,包括项目数据的命名,项目数据的类型,项目数据的存储地址等,数据访问方式包括GET(),POST()等方式,传输网络信息为客户端与项目平台之间的传输网络的标识信息,包括网络传输协议、网络传输路径等。The data access request is the network transmission data sent by the client to the project platform to request project data access. The data access request includes client information, project data information, data access method, transmission network information and other access sub-information. The information of the client is the identification information of the client, including the client IP address, the Mac address of the client, the geographic location of the client, etc.; the information of the project data is the identification information of the project data, including the name of the project data, the type of the project data, and the project data The storage address, etc., data access methods include GET(), POST(), etc., and the transmission network information is the identification information of the transmission network between the client and the project platform, including network transmission protocols, network transmission paths, etc.
示例性地,访问控制组件接收到客户端根据项目域名“www.ABC.com”发数发送据访问请求Request,其中,数据访问请求包括客户端的信息(客户端IP地址、客户端Mac地址、客户端地理定位)、项目数据的信息(项目数据的命名,项目数据的类型,项目数据的存储地址)、数据访问方式、传输网络信息(网络传输协议、网络传输路径)。Exemplarily, the access control component receives the data access request Request sent by the client according to the project domain name "www.ABC.com", wherein the data access request includes the client's information (client IP address, client Mac address, client terminal geographic location), project data information (name of project data, type of project data, storage address of project data), data access method, transmission network information (network transmission protocol, network transmission path).
接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名,为后续识别客户端是否为异常访问客户端提供了数据基础,另外,由于项目平台与蜜罐平台具有相同的项目域名,提升了蜜罐平台的伪装性。Receive the data access request sent by the client according to the project domain name. The project platform and the honeypot platform have the same project domain name, which provides a data basis for subsequent identification of whether the client is an abnormal access client. In addition, because the project platform and the honeypot platform The platform has the same project domain name, which improves the camouflage of the honeypot platform.
步骤204:根据数据访问请求,识别客户端是否为异常访问客户端。Step 204: According to the data access request, identify whether the client is an abnormal access client.
根据数据访问请求,识别客户端是否为异常访问客户端,具体方式为,根据数据访问请求中的访问信息,识别客户端是否为异常访问客户端。According to the data access request, identify whether the client is an abnormal access client, specifically, according to the access information in the data access request, identify whether the client is an abnormal access client.
继续上述实施例,访问控制组件中预先记录了异常访问参考IP地址的客户端为异常访问客户端,将数据访问请求中的访问信息,具体为客户端的信息中的客户端IP地址,与异常访问参考IP地址进行比对,客户端IP地址命中异常访问参考IP地址,则确定客户端为异常访问客户端。Continuing the above embodiment, the client whose abnormal access reference IP address is pre-recorded in the access control component is an abnormal access client, and the access information in the data access request, specifically the client IP address in the client information, and the abnormal access Compare with the reference IP address, if the client IP address matches the abnormal access reference IP address, it is determined that the client is an abnormal access client.
根据数据访问请求,识别客户端是否为异常访问客户端,为后续转发数据访问请求至蜜罐平台提供了参考,在保证了项目平台的数据安全的同时,提升了项目平台的稳定性。According to the data access request, identify whether the client is an abnormal access client, which provides a reference for the subsequent forwarding of data access requests to the honeypot platform, and improves the stability of the project platform while ensuring the data security of the project platform.
步骤206:若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。Step 206: If yes, forward the data access request to the honeypot platform, so that the client can access the honeypot platform.
本说明书实施例中,在项目平台上设置有多个对应蜜罐平台的蜜罐接口,蜜罐平台中预设有多个蜜罐代理端,每个蜜罐接口对应一个或多个预设的蜜罐代理端。各蜜罐代理端是预先对应于项目平台中项目端设置的伪造项目端,具有和项目平台中的项目端之间的高相似性。蜜罐平台被预设为只能被访问控制组件访问。设置多个蜜罐代理端保证了一个蜜罐代理端在被异常访问客户端攻克后,蜜罐平台难以被分辨,蜜罐平台仍然可以诱导异常访问客户端继续进行深度访问。In the embodiment of this specification, a plurality of honeypot interfaces corresponding to the honeypot platform are set on the project platform, and a plurality of honeypot agents are preset in the honeypot platform, and each honeypot interface corresponds to one or more preset Honeypot proxy. Each honeypot proxy end is a fake project end corresponding to the project end set in the project platform in advance, and has a high similarity with the project end in the project platform. Honeypot platforms are preset to be accessed only by access control components. Setting multiple honeypot agents ensures that after a honeypot agent is captured by an abnormal access client, the honeypot platform is difficult to distinguish, and the honeypot platform can still induce the abnormal access client to continue in-depth access.
将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问,具体方式为,通过蜜罐接口将数据访问请求转发至对应的蜜罐平台,以使异常访问客户端对蜜罐平台进行访问。Forward the data access request to the honeypot platform, so that the client can access the honeypot platform. The specific method is to forward the data access request to the corresponding honeypot platform through the honeypot interface, so that the abnormal access client can platform to access.
继续上述示例,通过蜜罐接口1,将数据访问请求Request转发至蜜罐平台,以使该异常访问客户端对蜜罐平台进行访问。Continuing with the above example, the data access request Request is forwarded to the honeypot platform through the honeypot interface 1, so that the abnormal access client can access the honeypot platform.
本说明书实施例中,接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,识别客户端是否为异常访问客户端,若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,引导更深层访问,在识别到客户端为异常访问客户端时,将数据访问请求转发至蜜罐平台,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。In the embodiment of this specification, the data access request sent by the client according to the project domain name is received, wherein the project platform and the honeypot platform have the same project domain name, and according to the data access request, identify whether the client is an abnormal access client, and if so, then Forward the data access request to the honeypot platform so that the client can access the honeypot platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform and guides deeper access. When the client is identified as an abnormal access client, it will Data access requests are forwarded to the honeypot platform, which avoids attacks on the project platform by abnormal access clients and protects the data security of the project platform.
可选地,项目平台与蜜罐平台部署于不同的地理位置。Optionally, the project platform and the honeypot platform are deployed in different geographic locations.
目前,一些方案中将蜜罐平台与项目平台部署在同一地理位置,即同一机房中。对应地,一旦蜜罐平台被攻克,异常访问客户端会控制流量转发的组件,对其流量转发的执行逻辑进行修改,使得蜜罐平台被当作跳板实现对项目平台的攻击。同时,由于蜜罐平台与项目平台被部署在同一机房中,蜜罐平台的运行需要消耗有限的数据资源,增加了机房硬件设备处理正常项目数据访问的性能负担。At present, in some schemes, the honeypot platform and the project platform are deployed in the same geographical location, that is, in the same computer room. Correspondingly, once the honeypot platform is compromised, the abnormal access client will control the components of traffic forwarding and modify the execution logic of its traffic forwarding, so that the honeypot platform can be used as a springboard to attack the project platform. At the same time, since the honeypot platform and the project platform are deployed in the same computer room, the operation of the honeypot platform needs to consume limited data resources, which increases the performance burden of the hardware equipment in the computer room to handle normal project data access.
本说明书实施例中,通过将项目平台与蜜罐平台部署于不同的地理位置,即将项目平台与蜜罐平台部署于不同的机房中。In the embodiment of this specification, by deploying the project platform and the honeypot platform in different geographic locations, the project platform and the honeypot platform are deployed in different computer rooms.
示例性地,项目平台部署在A地的机房中,蜜罐平台部署在B地的机房中,项目平台和蜜罐平台之间进行了物理隔离。Exemplarily, the project platform is deployed in a computer room at site A, and the honeypot platform is deployed in the computer room at site B, and the project platform and the honeypot platform are physically isolated.
通过机房层级的隔离,将项目平台与蜜罐平台进行物理隔离,结合上述访问控制组件的执行逻辑,即异常访问客户端需要通过项目域名发送数据访问请求,使得异常访问客户端难以感知到蜜罐平台的存在,即使蜜罐平台被攻克,异常访问客户端也难以利用访问控制组件对部署于不同地理位置的项目平台进行攻击,避免了蜜罐平台被当作跳板实现对项目平台的攻击。更进一步提升了项目平台的数据安全性。同时,由于蜜罐平台与项目平台被部署在不同的地理位置,蜜罐平台的运行不消耗项目平台的资源,降低了硬件设备处理正常项目数据访问的性能负担,提升了项目平台的数据处理性能。Through the isolation at the computer room level, the project platform is physically isolated from the honeypot platform, combined with the execution logic of the above access control components, that is, the abnormal access client needs to send data access requests through the project domain name, making it difficult for the abnormal access client to perceive the honeypot With the existence of the platform, even if the honeypot platform is conquered, it is difficult for abnormal access clients to use access control components to attack project platforms deployed in different geographical locations, which prevents the honeypot platform from being used as a springboard to attack the project platform. It further improves the data security of the project platform. At the same time, since the honeypot platform and the project platform are deployed in different geographical locations, the operation of the honeypot platform does not consume the resources of the project platform, which reduces the performance burden of hardware devices to handle normal project data access, and improves the data processing performance of the project platform .
可选地,在步骤204之后,还包括如下具体步骤:Optionally, after
若否,则允许客户端访问项目平台中的项目数据。If not, the client is allowed to access the project data in the project platform.
若访问控制组件识别客户端不为异常访问客户端,即正常访问客户端,则允许正常访问客户端正常访问项目平台中的项目数据,来保证项目平台可以正常提供数据访问功能。If the access control component identifies that the client is not an abnormal access client, that is, a normal access client, then the normal access client is allowed to normally access the project data in the project platform to ensure that the project platform can normally provide data access functions.
允许客户端访问项目平台中的项目数据,具体方式为,允许正常访问客户端通过项目接口对项目平台中的项目数据进行访问。The client is allowed to access the project data in the project platform. The specific method is to allow normal access clients to access the project data in the project platform through the project interface.
示例性地,访问控制组件中预先记录了特定网络传输路径的客户端为异常访问客户端,将数据访问请求中的访问信息,具体为客户端的信息中的网络传输路径,与特定网络传输路径进行比对,客户端的信息中的网络传输路径没有特定网络传输路径,确定客户端为正常访问客户端,允许该客户端通过项目接口1对项目平台中对应项目接口1的项目数据进行访问。Exemplarily, the client whose specific network transmission path is pre-recorded in the access control component is an abnormal access client, and the access information in the data access request, specifically the network transmission path in the client information, is compared with the specific network transmission path In comparison, the network transmission path in the client information does not have a specific network transmission path, and the client is determined to be a normal access client, allowing the client to access the project data corresponding to project interface 1 in the project platform through project interface 1.
若识别得到客户端不为异常访问客户端,则允许客户端访问项目平台中的项目数据,保证了项目平台可以正常提供数据访问功能,保证了项目平台的稳定性。If it is identified that the client is not abnormally accessing the client, the client is allowed to access the project data in the project platform, which ensures that the project platform can normally provide data access functions and the stability of the project platform.
可选地,项目平台包括项目端;Optionally, the project platform includes a project end;
对应地,允许客户端访问项目平台中的项目数据,包括如下具体步骤:Correspondingly, allowing the client to access the project data in the project platform includes the following specific steps:
通过项目接口将数据访问请求发送至目标项目端;Send the data access request to the target project side through the project interface;
接收目标项目端基于数据访问请求返回的项目数据;Receive the project data returned by the target project end based on the data access request;
将项目数据发送至客户端。Send project data to client.
项目平台中的项目端为根据项目数据的信息设置的数据访问功能模块,例如,项目数据为项目平台的日志数据,项目端为日志数据的数据访问功能模块。对项目端预设特定的数据访问接口,即为项目接口。目标项目端为对应于客户端发送的数据访问请求中项目数据的类型的项目端。The project side in the project platform is a data access function module set according to the information of the project data, for example, the project data is the log data of the project platform, and the project side is a data access function module of the log data. A specific data access interface is preset for the project side, which is the project interface. The target item end is an item end corresponding to the type of item data in the data access request sent by the client.
通过项目接口将数据访问请求发送至目标项目端,具体方式为,根据数据访问请求中的项目数据的信息,确定对应的项目接口,通过项目接口与目标项目端建立数据传输连接,将数据访问请求发送至目标项目端。Send the data access request to the target project end through the project interface. The specific method is to determine the corresponding project interface according to the project data information in the data access request, establish a data transmission connection with the target project end through the project interface, and send the data access request to the target project end. Send to the target project side.
示例性地,根据数据访问请求Request中的项目数据的类型:客户个人信息,确定对应的项目接口23,通过项目接口23与客户个人信息项目端建立数据传输连接,将数据访问请求Request发送至客户个人信息项目端。Exemplarily, according to the type of project data in the data access request Request: customer personal information, determine the corresponding project interface 23, establish a data transmission connection with the customer personal information project end through the project interface 23, and send the data access request Request to the customer personal information items.
接收目标项目端基于数据访问请求返回的项目数据,具体方式为,接收目标项目端基于数据访问请求中的项目数据的信息返回的项目数据。The project data returned by the target project end based on the data access request is received, specifically, the project data returned by the target project end based on the information of the project data in the data access request is received.
示例性地,数据访问请求中项目数据的命名为“Customer_info”,客户个人信息项目端根据该项目数据的命名获取对应的项目数据DATA,访问控制组件接收客户个人信息项目端返回的项目数据DATA。Exemplarily, the item data in the data access request is named "Customer_info", the customer personal information item end obtains the corresponding item data DATA according to the item data name, and the access control component receives the item data DATA returned by the customer personal information item end.
通过项目接口将数据访问请求发送至目标项目端,接收目标项目端基于数据访问请求返回的项目数据,将项目数据发送至客户端。通过项目接口将数据访问请求发送至目标项目端,使正常访问客户端可以准确获得项目数据,更进一步保证了项目平台可以正常提供数据访问功能和项目平台的稳定性。Send the data access request to the target project side through the project interface, receive the project data returned by the target project side based on the data access request, and send the project data to the client. The data access request is sent to the target project end through the project interface, so that the normal access client can accurately obtain the project data, which further ensures that the project platform can normally provide data access functions and the stability of the project platform.
可选地,蜜罐平台包括蜜罐代理端;Optionally, the honeypot platform includes a honeypot agent;
对应地,步骤206中将数据访问请求转发至蜜罐平台,包括如下具体步骤:Correspondingly, in
通过蜜罐接口将数据访问请求转发至目标蜜罐代理端;Forward the data access request to the target honeypot agent through the honeypot interface;
接收目标蜜罐代理端基于数据访问请求返回的蜜饵数据;Receive the honeybait data returned by the target honeypot agent based on the data access request;
将蜜饵数据发送至客户端。Send the honeybait data to the client.
蜜罐平台中的蜜罐代理端为对应项目端的项目数据构建的数据访问功能模块,蜜罐代理端中部署有蜜饵数据,蜜饵数据与项目数据间具有高相似性,蜜罐代理端对蜜饵数据的部署方式与项目端对项目数据的部署方式间同样具有高相似性。例如,对应于日志数据项目端,构建日志数据蜜罐代理端,其中部署有蜜饵数据伪造日志数据,日志数据项目端对日志数据的部署方式为:按照天数设置单独的数据单元(例如,文件夹),日志数据中的时间信息为“年-月-日-小时-分-秒”的格式,日志数据蜜罐代理端也按照天数设置单独的数据单元(例如,文件夹),蜜饵数据的时间信息也为“年-月-日-小时-分-秒”的格式。目标蜜罐代理端为对应于客户端发送的数据访问请求中项目数据的信息的蜜罐代理端。由于蜜饵数据与项目数据间具有高相似性,蜜罐代理端对蜜饵数据的部署方式与项目端对项目数据的部署方式间同样具有高相似性,异常访问客户端在进行异常访问时,难以分辨蜜饵数据和项目数据,并且无法分辨进行数据访问的对象是项目平台还是蜜罐平台,诱导异常访问客户端进行更深层的数据访问。The honeypot agent in the honeypot platform is a data access function module constructed for the project data corresponding to the project end. Honeypot data is deployed in the honeypot agent. There is a high similarity between the honeybait data and the project data. There is also a high similarity between the deployment method of honeybait data and the deployment method of project data on the project side. For example, corresponding to the log data project end, build a log data honeypot proxy end, in which honeybait data is deployed to forge log data, and the log data project end deploys log data in the following way: set a separate data unit according to the number of days (for example, file Folder), the time information in the log data is in the format of "year-month-day-hour-minute-second", and the log data honeypot agent also sets a separate data unit (for example, folder) according to the number of days, honeybait data The time information is also in the format of "year-month-day-hour-minute-second". The target honeypot agent is the honeypot agent corresponding to the item data information in the data access request sent by the client. Due to the high similarity between the honeybait data and the project data, there is also a high similarity between the honeypot agent's deployment method for the honeybait data and the project side's deployment method for the project data. When the abnormal access client performs abnormal access, It is difficult to distinguish honeybait data from project data, and it is impossible to distinguish whether the object of data access is the project platform or the honeypot platform, which induces abnormal access clients to perform deeper data access.
蜜饵数据的构建方法可以为对项目数据执行:增添、修改、删除、遮盖等方式的至少一种,也可以利用预先训练的神经网络模型对项目数据进行处理,还可以为获取部分项目数据,将经过前两种方式构建的蜜饵数据与部分项目数据进行混合处理,得到蜜饵数据。这样的蜜饵数据让异常访问客户端在进行异常访问时,更难以分辨蜜饵数据和项目数据,更进一步地诱导异常访问客户端进行更深层的数据访问。The construction method of the honeybait data can be to execute at least one of the methods of adding, modifying, deleting, and covering the project data, or use the pre-trained neural network model to process the project data, or to obtain part of the project data, The honeybait data constructed by the first two methods are mixed with some project data to obtain the honeybait data. Such honeybait data makes it more difficult for abnormal access clients to distinguish between honeybait data and project data during abnormal access, and further induces abnormal access clients to perform deeper data access.
通过蜜罐接口将数据访问请求转发至目标蜜罐代理端,具体方式为,根据数据访问请求中的项目数据的信息,确定对应的蜜罐接口,通过蜜罐接口与目标蜜罐代理端建立数据传输连接,将数据访问请求发送至目标蜜罐代理端。The data access request is forwarded to the target honeypot agent through the honeypot interface. The specific method is to determine the corresponding honeypot interface according to the project data information in the data access request, and establish data with the target honeypot agent through the honeypot interface. The transmission connection sends the data access request to the target honeypot agent.
示例性地,根据数据访问请求Request中的项目数据的存储地址为“Browser\UserData\Default”(客户个人信息),确定对应的蜜罐接口35,通过蜜罐接口35与客户个人信息蜜罐代理端建立数据传输连接,将数据访问请求Request发送至客户个人信息蜜罐代理端。Exemplarily, according to the storage address of the item data in the data access request Request is "Browser\UserData\Default" (customer personal information), determine the corresponding honeypot interface 35, and communicate with the customer personal information honeypot agent through the honeypot interface 35 The terminal establishes a data transmission connection, and sends the data access request Request to the client's personal information honeypot agent.
接收目标蜜罐代理端基于数据访问请求返回的蜜饵数据,具体方式为,接收目标项目端基于数据访问请求中的项目数据的信息返回的项目数据。Receive the honeybait data returned by the target honeypot agent based on the data access request. The specific method is to receive the item data returned by the target project end based on the item data information in the data access request.
示例性地,数据访问请求中项目数据的存储地址为“Browser\User Data\Default”,客户个人信息蜜罐代理端根据该项目数据的存储地址获取对应的项目数据DATA,访问控制组件接收客户个人信息蜜罐代理端返回的项目数据DATA。Exemplarily, the storage address of the project data in the data access request is "Browser\User Data\Default", the customer personal information honeypot agent obtains the corresponding project data DATA according to the storage address of the project data, and the access control component receives the customer personal information The project data DATA returned by the information honeypot agent.
通过蜜罐接口将数据访问请求转发至目标蜜罐代理端,接收目标蜜罐代理端基于数据访问请求返回的蜜饵数据,将蜜饵数据发送至客户端。通过蜜罐接口将数据访问请求发送至目标蜜罐代理端,使异常访问客户端可以准确获得蜜饵数据,进而更难分辨蜜饵数据和项目数据,更难分辨蜜罐平台和项目平台,更进一步提升了蜜罐平台的伪装性,同时更进一步保证了项目平台的数据安全。Forward the data access request to the target honeypot agent through the honeypot interface, receive the honeybait data returned by the target honeypot agent based on the data access request, and send the honeybait data to the client. The data access request is sent to the target honeypot agent through the honeypot interface, so that the abnormal access client can accurately obtain the honeybait data, which makes it more difficult to distinguish honeybait data from project data, and even more difficult to distinguish honeypot platform from project platform. It further improves the camouflage of the honeypot platform, and at the same time further ensures the data security of the project platform.
可选地,在步骤204之前,还包括如下具体步骤:Optionally, before
接收云服务端发送的检测策略,其中,检测策略为云服务端根据蜜罐平台收集的客户端的攻击行为事件生成;Receive the detection strategy sent by the cloud server, wherein the detection strategy is generated by the cloud server according to the attack behavior events of the client collected by the honeypot platform;
对应地,步骤204包括如下具体步骤:Correspondingly,
解析数据访问请求,获得访问信息;Analyze data access requests to obtain access information;
利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端。Use the detection strategy to detect the access information and identify whether the client is an abnormal access client.
云服务端为具有攻击行为事件收集功能、攻击行为事件分析功能和检测策略分发的服务端,可以为云服务器。云服务端与访问控制组件、蜜罐平台之间具有数据传输连接,云服务端与访问控制组件的数据传输连接为“从云服务端到访问控制组件”的单向数据传输连接,云服务端与蜜罐平台的数据传输连接为“从蜜罐平台到云服务端”的单向数据传输连接。通过设定这样的单向传输连接,保证了蜜罐平台在被异常访问客户端攻克后,无法利用数据传输连接从云服务端获得检测策略,对其进行修改,或者向访问控制组件发送经过修改的检测策略,使得访问控制组件的流量分析功能和流量转发功能失效。The cloud server is a server with functions of collecting attack behavior events, analyzing functions of attack behavior events and distributing detection strategies, and may be a cloud server. There is a data transmission connection between the cloud server and the access control component and the honeypot platform. The data transmission connection between the cloud server and the access control component is a one-way data transmission connection "from the cloud server to the access control component". The data transmission connection with the honeypot platform is a one-way data transmission connection "from the honeypot platform to the cloud server". By setting such a one-way transmission connection, it is ensured that after the honeypot platform is captured by the abnormal access client, it cannot use the data transmission connection to obtain the detection policy from the cloud server, modify it, or send the modified policy to the access control component. The detection strategy makes the traffic analysis function and traffic forwarding function of the access control component invalid.
检测策略为云服务端根据蜜罐平台收集的客户端的攻击行为事件生成的对客户端的识别策略。检测策略在访问控制组件上实现流量分析功能。检测策略的具体生成过程可以根据攻击行为事件对人为设定的初始检测策略进行调整得到的,也可以为对攻击行为事件进行分析后直接得到的,在此不作限定。可选地,检测策略具有对应的版本,按照预设的版本生成条件,生成更新版本的检测策略。The detection strategy is an identification strategy for the client generated by the cloud server based on the attack behavior events of the client collected by the honeypot platform. The detection policy implements the traffic analysis function on the access control component. The specific generation process of the detection strategy can be obtained by adjusting the artificially set initial detection strategy according to the attack behavior event, or can be obtained directly after analyzing the attack behavior event, which is not limited here. Optionally, the detection strategy has a corresponding version, and an updated version of the detection strategy is generated according to preset version generation conditions.
访问信息为确定客户端身份的参考信息,包括客户端、项目数据、数据访问方式和/或客户端与项目平台之间的传输网络等访问子信息。访问信息可以作为参考识别客户端是否为异常访问客户端。访问信息包括客户端的信息、项目数据的信息、数据访问方式、传输网络信息等。客户端的信息为客户端的标识信息,包括客户端IP地址、客户端Mac地址、客户端地理定位等;项目数据的信息为项目数据的标识信息,包括项目数据的命名,项目数据的类型,项目数据的存储地址等,数据访问方式包括GET(),POST()等方式,传输网络信息为客户端与项目平台之间的传输网络的标识信息,包括网络传输协议、网络传输路径等。Access information is reference information for determining the identity of the client, including access sub-information such as the client, project data, data access methods, and/or the transmission network between the client and the project platform. The access information can be used as a reference to identify whether the client is an abnormal access client. Access information includes client information, project data information, data access methods, transmission network information, etc. The information of the client is the identification information of the client, including the client IP address, the Mac address of the client, the geographic location of the client, etc.; the information of the project data is the identification information of the project data, including the name of the project data, the type of the project data, and the project data The storage address, etc., data access methods include GET(), POST(), etc., and the transmission network information is the identification information of the transmission network between the client and the project platform, including network transmission protocols, network transmission paths, etc.
接收云服务端发送的检测策略,具体方式为,接收云服务端通过单向数据传输连接发送的检测策略。更进一步地,发送的条件可以为按照预设频率进行发送,也可以为完成检测策略的更新后就进行发送,还可以为按照检测策略的版本进行发送,在此不作限定。The detection strategy sent by the cloud server is received, specifically, the detection strategy sent by the cloud server through a one-way data transmission connection is received. Furthermore, the sending condition may be sending according to a preset frequency, or sending after the update of the detection strategy is completed, or sending according to a version of the detection strategy, which is not limited here.
示例性地,接收云服务端按照预设频率:1天1次、通过单向数据传输连接发送的检测策略:异常访问参考信息:192.168.6.0-192.168.6.255;XX地区、YY地区、ZZ地区……。Exemplarily, the detection strategy sent by the receiving cloud server according to the preset frequency: once a day, through a one-way data transmission connection: Abnormal access reference information: 192.168.6.0-192.168.6.255; XX region, YY region, ZZ region ....
解析数据访问请求,获得访问信息,具体方式为,利用信息识别工具识别数据访问请求,获得访问信息。具体地,信息识别工具为具有关键词识别功能的工具,例如,基于正则表达式的信息识别工具,预先训练的信息识别神经网络模型。Analyze the data access request to obtain access information, specifically by using an information identification tool to identify the data access request and obtain access information. Specifically, the information recognition tool is a tool with a keyword recognition function, for example, a regular expression-based information recognition tool, a pre-trained information recognition neural network model.
继续上述示例,利用基于正则表达式的信息识别工具,识别数据访问请求的报文信息,获得访问信息为:192.168.6.7;YY地区。Continuing the above example, use the regular expression-based information identification tool to identify the message information of the data access request, and obtain the access information: 192.168.6.7; YY region.
利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端,具体方式为,利用检测策略对访问信息中各访问子信息进行检测,识别客户端是否为异常访问客户端。更进一步地,可以为根据各访问子信息计算得到对应的异常置信度,根据各访问子信息对应的异常置信度确定客户端是否为异常访问客户端,计算得到各访问子信息对应的异常置信度的方法可以为利用预先训练的神经网络模型,也可以为利用置信度计算函数,在此不作限定。另外,可以将各访问子信息与检测策略中的异常访问参考信息进行比对,若命中其中的一个或多个异常访问参考信息,确定客户端为异常访问客户端,若未命中其中的一个或多个异常访问参考信息,确定客户端为正常访问客户端。Using the detection strategy to detect the access information to identify whether the client is an abnormal access client. The specific method is to use the detection strategy to detect each access sub-information in the access information to identify whether the client is an abnormal access client. Furthermore, in order to obtain the corresponding abnormal confidence degree calculated according to each access sub-information, determine whether the client is an abnormal access client according to the abnormal confidence degree corresponding to each access sub-information, and calculate the abnormal confidence degree corresponding to each access sub-information The method may be to use a pre-trained neural network model, or to use a confidence calculation function, which is not limited here. In addition, each access sub-information can be compared with the abnormal access reference information in the detection strategy. If one or more of the abnormal access reference information is matched, it is determined that the client is an abnormal access client. Multiple abnormal access reference information to determine that the client is a normal access client.
继续上述示例,检测策略中记录有异常访问参考信息,将各访问子信息与检测策略中的异常访问参考信息进行比对,命中两个异常访问参考信息(192.168.6.7;YY地区),确定客户端为异常访问客户端。Continuing with the above example, abnormal access reference information is recorded in the detection policy, compare each access sub-information with the abnormal access reference information in the detection policy, hit two abnormal access reference information (192.168.6.7; YY region), and determine the customer The end is an exception access client.
接收云服务端发送的检测策略,其中,检测策略为云服务端根据蜜罐平台收集的客户端的攻击行为事件生成,解析数据访问请求,获得访问信息,利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端。提升了对客户端的识别准确度,更进一步保护了项目平台的数据安全。Receive the detection strategy sent by the cloud server, where the detection strategy is generated by the cloud server based on the client’s attack behavior events collected by the honeypot platform, parse the data access request, obtain access information, use the detection strategy to detect and identify the access information Whether the client is an exception access client. The recognition accuracy of the client is improved, and the data security of the project platform is further protected.
参见图3,图3示出了本说明书一个实施例提供的另一种蜜罐防护方法的流程图,该方法应用于蜜罐平台,具体包括以下步骤。Referring to FIG. 3 , FIG. 3 shows a flow chart of another honeypot protection method provided by an embodiment of this specification. The method is applied to a honeypot platform and specifically includes the following steps.
步骤302:接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名。Step 302: Receive the data access request forwarded by the project platform, wherein the data access request is sent to the project platform by the client according to the project domain name, and the project platform and the honeypot platform have the same project domain name.
本说明书实施例应用于蜜罐平台,客户端为了进行数据访问,需要向项目平台发送数据访问请求,项目平台将数据访问请求转发至蜜罐平台,实现了蜜罐平台与真实项目在数据访问部分深度集成的同时,数据之间进行了解耦,需要在异常访问客户端对项目平台发送数据访问请求后,对应提供蜜饵数据,使得异常访问客户端无法感知到不是对项目平台进行数据访问,而是对蜜罐平台进行数据访问,提升了蜜罐平台的伪装性,保护了项目平台的数据安全。The embodiment of this specification is applied to the honeypot platform. In order to perform data access, the client needs to send a data access request to the project platform, and the project platform forwards the data access request to the honeypot platform, realizing the data access part between the honeypot platform and the real project. At the same time of deep integration, data is decoupled. After the abnormal access client sends a data access request to the project platform, it needs to provide corresponding honeybait data, so that the abnormal access client cannot perceive that it is not accessing the project platform. Instead, data access to the honeypot platform improves the camouflage of the honeypot platform and protects the data security of the project platform.
蜜罐平台被预设为只能被项目平台中的访问控制组件访问。The honeypot platform is preset to be accessed only by the access control components in the project platform.
项目平台为部署在网络系统中、记录有项目数据的数据服务平台。例如,某应用程序或者网站的项目数据服务器,某机构的项目数据库等。在项目平台上设置有多个对应蜜罐平台的蜜罐接口。The project platform is a data service platform that is deployed in the network system and records project data. For example, a project data server of an application or a website, a project database of an institution, etc. There are multiple honeypot interfaces corresponding to the honeypot platform on the project platform.
数据访问请求为客户端发送给项目平台的请求进行项目数据访问的网络传输数据。The data access request is the network transmission data sent by the client to the project platform to request project data access.
项目域名为项目平台对外开放的项目数据的访问域名。项目平台与蜜罐平台的项目域名是相同的,对于客户端只能感知到通过项目域名发送了数据访问请求,即无法对应确定是对项目平台还是对蜜罐平台发送了数据访问请求。The project domain name is the access domain name of the project data open to the public on the project platform. The project domain name of the project platform and the honeypot platform are the same, and the client can only perceive that the data access request is sent through the project domain name, that is, it cannot be determined whether the data access request is sent to the project platform or the honeypot platform.
接收项目平台转发的数据访问请求,具体方式为,接收项目平台通过蜜罐接口将数据访问请求转发的数据访问请求。Receive the data access request forwarded by the project platform, specifically by receiving the data access request forwarded by the project platform through the honeypot interface.
示例性地,接收项目平台通过蜜罐接口1转发的数据访问请求Request。Exemplarily, the data access request Request forwarded by the project platform through the honeypot interface 1 is received.
通过接收项目平台转发的数据访问请求,为后续获取对应的蜜饵数据提供了数据基础,由于项目平台与蜜罐平台具有相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性。By receiving the data access request forwarded by the project platform, it provides a data basis for the subsequent acquisition of the corresponding honeybait data. Since the project platform and the honeypot platform have the same project domain name, the client cannot identify the honeypot platform, which improves the honeypot. Platform camouflage.
步骤304:根据数据访问请求,获取对应的蜜饵数据。Step 304: Obtain corresponding honeybait data according to the data access request.
蜜饵数据为对应项目数据构建的伪造项目数据,蜜饵数据与项目数据之间具有高相似性。The honeybait data is forged project data constructed corresponding to the project data, and there is a high similarity between the honeybait data and the project data.
根据数据访问请求,获取对应的蜜饵数据,具体方式为,根据数据访问请求的访问信息,获取对应的蜜饵数据。Obtain the corresponding honeybait data according to the data access request. The specific method is to obtain the corresponding honeybait data according to the access information of the data access request.
访问信息为确定客户端身份的参考信息,包括客户端、项目数据、数据访问方式和/或客户端与项目平台之间的传输网络等访问子信息。访问信息可以作为参考,识别客户端是否为异常访问客户端。访问信息包括客户端的信息、项目数据的信息、数据访问方式、传输网络信息等。客户端的信息为客户端的标识信息,包括客户端IP地址、客户端Mac地址、客户端地理定位等;项目数据的信息为项目数据的标识信息,包括项目数据的命名,项目数据的类型,项目数据的存储地址等,数据访问方式包括GET(),POST()等方式,传输网络信息为客户端与项目平台之间的传输网络的标识信息,包括网络传输协议、网络传输路径等。Access information is reference information for determining the identity of the client, including access sub-information such as the client, project data, data access methods, and/or the transmission network between the client and the project platform. The access information can be used as a reference to identify whether the client is an abnormal access client. Access information includes client information, project data information, data access methods, transmission network information, etc. The information of the client is the identification information of the client, including the client IP address, the Mac address of the client, the geographic location of the client, etc.; the information of the project data is the identification information of the project data, including the name of the project data, the type of the project data, and the project data The storage address, etc., data access methods include GET(), POST(), etc., and the transmission network information is the identification information of the transmission network between the client and the project platform, including network transmission protocols, network transmission paths, etc.
继续上述示例,根据数据访问请求Request中项目数据的命名为“Customer_info”,获取对应的蜜饵数据Fake_DATA。Continuing with the above example, according to the item data named "Customer_info" in the data access request Request, obtain the corresponding honeybait data Fake_DATA.
通过根据数据访问请求,获取对应的蜜饵数据,为后续将蜜饵数据反馈给项目平台提供了数据基础,保证了获取与项目数据高相似性的蜜饵数据,使得客户端无法识别出蜜罐平台,进一步提升了蜜罐平台的伪装性。By obtaining the corresponding honeybait data according to the data access request, it provides a data basis for the subsequent feedback of the honeybait data to the project platform, ensuring the acquisition of honeybait data with high similarity with the project data, so that the client cannot identify the honeypot platform, further enhancing the camouflage of the honeypot platform.
步骤306:将蜜饵数据反馈给项目平台。Step 306: Feed back the honeybait data to the project platform.
将蜜饵数据反馈给项目平台后,项目平台将蜜饵数据转发至客户端。这样通过项目平台将蜜饵数据转发至客户端的方式,保证了在客户端不与蜜罐平台直接进行数据传输,进而使得异常访问客户端难以感受到蜜罐平台的存在,诱导异常访问客户端对蜜罐平台继续进行深度访问。After the honeybait data is fed back to the project platform, the project platform forwards the honeybait data to the client. In this way, the method of forwarding the honeybait data to the client through the project platform ensures that the client does not directly transmit data with the honeypot platform, which makes it difficult for the abnormal access client to feel the existence of the honeypot platform, and induces the abnormal access client to Honeypot platforms continue to conduct in-depth access.
将蜜饵数据反馈给项目平台,具体方式为,通过蜜罐接口将蜜饵数据反馈给项目平台。The honeybait data is fed back to the project platform. The specific method is to feed back the honeybait data to the project platform through the honeypot interface.
示例性地,通过蜜罐接口1将蜜饵数据Fake_DATA反馈给项目平台,以使项目平台将蜜饵数据Fake_DATA转发至客户端。Exemplarily, the honeypot data Fake_DATA is fed back to the project platform through the honeypot interface 1, so that the project platform forwards the honeybait data Fake_DATA to the client.
本说明书实施例中,接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,获取对应的蜜饵数据,将蜜饵数据反馈给项目平台。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,根据数据访问请求,获取对应的蜜饵数据,保证了获取与项目数据高相似性的蜜饵数据,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,蜜罐平台将蜜饵数据反馈给项目平台,不与客户端直接进行数据传输,使得异常访问客户端难以感受到蜜罐平台的存在,更进一步提升了蜜罐平台的伪装性,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。In the embodiment of this specification, the data access request forwarded by the project platform is received. The data access request is sent to the project platform by the client according to the project domain name. The project platform and the honeypot platform have the same project domain name. According to the data access request, obtain Corresponding honeybait data, feedback the honeybait data to the project platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, and obtain the corresponding honeybait data according to the data access request, ensuring the acquisition of honeybait data with high similarity with the project data, making The client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform. The honeypot platform feeds back the honeybait data to the project platform, and does not directly transmit data with the client, making it difficult for abnormal access clients to feel the honeypot platform The existence of the honeypot platform further enhances the camouflage of the honeypot platform, avoids the attack behavior of the abnormal access client on the project platform, and protects the data security of the project platform.
可选地,蜜罐平台与项目平台部署于不同的地理位置。Optionally, the honeypot platform and the project platform are deployed in different geographic locations.
图2实施例中已经对该实施例进行详细说明,在此不再赘述。This embodiment has been described in detail in the embodiment of FIG. 2 , and will not be repeated here.
可选地,蜜罐平台包括蜜罐代理端;Optionally, the honeypot platform includes a honeypot agent;
对应地,在步骤304之前,还包括如下具体步骤:Correspondingly, before
根据数据访问请求,确定客户端对目标蜜罐代理端的访问权限;Determine the client's access authority to the target honeypot agent according to the data access request;
在客户端对目标蜜罐代理端具有访问权限的情况下,根据访问权限,从目标蜜罐代理端获取对应的蜜饵数据。In the case that the client has access authority to the target honeypot agent, according to the access authority, the corresponding honeybait data is obtained from the target honeypot agent.
蜜罐平台中预设有多个蜜罐代理端,每个蜜罐代理端对应一个项目平台上的蜜罐接口。各蜜罐代理端是预先对应于项目平台中项目端设置的伪造项目端,具有和项目平台中的项目端之间的高相似性。设置多个蜜罐代理端保证了一个蜜罐代理端在被异常访问客户端功课后,在蜜罐平台难以被分辨的情况下,蜜罐平台仍然可以诱导异常访问客户端继续进行深度访问。一般地,项目平台中的项目端具有访问权限,例如,平台管理密钥对应的项目端需要管理员身份才能进行访问,因而需要将蜜罐代理端设置对应的访问权限,来提升蜜罐平台的攻击难度和蜜罐平台与项目平台的相似性,进而来提升蜜罐平台的伪装性。目标蜜罐代理端为对应于数据访问请求中项目数据的信息的蜜罐代理端。There are multiple honeypot agents preset in the honeypot platform, and each honeypot agent corresponds to a honeypot interface on a project platform. Each honeypot proxy end is a fake project end corresponding to the project end set in the project platform in advance, and has a high similarity with the project end in the project platform. Setting up multiple honeypot agents ensures that a honeypot agent can still induce abnormal access clients to continue in-depth access when the honeypot platform is difficult to distinguish after a honeypot agent has homework by an abnormal access client. Generally, the project side in the project platform has access rights. For example, the project side corresponding to the platform management key needs an administrator identity to access, so it is necessary to set the corresponding access rights on the honeypot agent to improve the honeypot platform. Attack difficulty and the similarity between the honeypot platform and the project platform, and then improve the camouflage of the honeypot platform. The target honeypot agent is the honeypot agent corresponding to the information of the item data in the data access request.
访问权限为表征客户端对部署在蜜罐代理端上的部分或者全部数据的数据访问权限。具体的访问权限包括在应用层设置的对类和方法的调用权限,在容器层对容器的数据访问权限。例如,部分类和方法存在高危风险,在项目端中对这样的类和方法数据进行调用,需要对应的调用权限,因而在存在高危风险的类和方法数据的蜜罐代理端对应设置调用权限。同理,部分容器中的数据是无法被访问的,对应设置访问权限。Access rights represent the data access rights of the client to some or all of the data deployed on the honeypot agent. The specific access rights include the call rights to classes and methods set at the application layer, and the data access rights to the container at the container layer. For example, some classes and methods have high-risk risks. Calling such class and method data on the project side requires corresponding calling permissions. Therefore, corresponding calling permissions are set on the honeypot agent side of high-risk classes and method data. Similarly, the data in some containers cannot be accessed, and the access permissions should be set accordingly.
根据数据访问请求,确定客户端对目标蜜罐代理端的访问权限,具体方式为,根据数据访问请求中的访问信息,确定客户端对目标蜜罐代理端的访问权限。更进一步地,根据数据访问请求中的客户端的信息,确定客户端对目标蜜罐代理端的访问权限。According to the data access request, the access authority of the client to the target honeypot agent is determined. The specific method is to determine the client's access authority to the target honeypot agent according to the access information in the data access request. Further, according to the information of the client in the data access request, determine the access authority of the client to the target honeypot agent.
示例性地,根据数据访问请求Request中的客户端IP地址192.168.2.7,确定客户端对目标蜜罐代理端的访问权限为:对全部数据具备权限。根据访问权限(对全部数据具备权限),从目标蜜罐代理端获取对应的蜜饵数据Fake_DATA。Exemplarily, according to the client IP address 192.168.2.7 in the data access request Request, it is determined that the client's access authority to the target honeypot agent is: authority to all data. Obtain the corresponding honeybait data Fake_DATA from the target honeypot agent according to the access authority (with authority to all data).
根据数据访问请求,确定客户端对目标蜜罐代理端的访问权限,在客户端对目标蜜罐代理端具有访问权限的情况下,根据访问权限,从目标蜜罐代理端获取对应的蜜饵数据。提升蜜罐平台的攻击难度和蜜罐平台与项目平台的相似性,进一步提升了蜜罐平台的伪装性。According to the data access request, determine the access authority of the client to the target honeypot agent, and if the client has access authority to the target honeypot agent, obtain the corresponding honeybait data from the target honeypot agent according to the access authority. Improve the attack difficulty of the honeypot platform and the similarity between the honeypot platform and the project platform, and further enhance the camouflage of the honeypot platform.
可选地,该方法还包括如下具体步骤:Optionally, the method also includes the following specific steps:
收集客户端的攻击行为事件;Collect client attack behavior events;
将攻击行为事件发送至云服务端,以使云服务端根据攻击行为事件生成检测策略,检测策略用于项目平台上集成的访问控制组件利用检测策略识别客户端是否为异常访问客户端。The attack behavior event is sent to the cloud server, so that the cloud server generates a detection strategy based on the attack behavior event, and the detection strategy is used by the access control component integrated on the project platform to use the detection strategy to identify whether the client is an abnormal access client.
云服务端为具有攻击行为事件收集功能、攻击行为事件分析功能和检测策略分发的服务端。云服务端与访问控制组件、蜜罐平台之间具有数据传输连接,云服务端与蜜罐平台的数据传输连接为“从蜜罐平台到云服务端”的单向数据传输连接,通过设定这样的单向传输连接,保证了蜜罐平台在被异常访问客户端攻克后,无法利用数据传输连接从云服务端获得检测策略。The cloud server is a server with functions of collecting attack behavior events, analyzing functions of attack behavior events and distributing detection strategies. There is a data transmission connection between the cloud server and the access control component and the honeypot platform. The data transmission connection between the cloud server and the honeypot platform is a one-way data transmission connection "from the honeypot platform to the cloud server". Such a one-way transmission connection ensures that after the honeypot platform is captured by the abnormal access client, it cannot use the data transmission connection to obtain the detection strategy from the cloud server.
检测策略为云服务端根据蜜罐平台收集的客户端的攻击行为事件生成的对客户端的识别策略。检测策略在访问控制组件上实现流量分析功能。检测策略的具体生成过程可以根据攻击行为事件对人为设定的初始检测策略进行调整得到的,也可以为对攻击行为事件进行分析后直接得到的,其中,对攻击行为事件进行分析的具体分析方法,可以为提取攻击行为事件中的访问信息后,利用神经网络模型进行分析。可选地,检测策略具有对应的版本,按照预设的版本生成条件,生成更新版本的检测策略。The detection strategy is an identification strategy for the client generated by the cloud server based on the attack behavior events of the client collected by the honeypot platform. The detection policy implements the traffic analysis function on the access control component. The specific generation process of the detection strategy can be obtained by adjusting the artificially set initial detection strategy according to the attack behavior event, or it can be obtained directly after analyzing the attack behavior event. Among them, the specific analysis method for analyzing the attack behavior event , after extracting the access information in the attack behavior events, the neural network model can be used for analysis. Optionally, the detection strategy has a corresponding version, and an updated version of the detection strategy is generated according to preset version generation conditions.
将攻击行为事件发送至云服务端,具体方式为,通过单向数据传输连接将攻击行为事件发送至云服务端。更进一步地,发送的条件可以为按照预设频率进行发送,也可以为客户端完成对蜜罐平台的攻击行为后发送,在此不作限定。The attack behavior event is sent to the cloud server, specifically, the attack behavior event is sent to the cloud server through a one-way data transmission connection. Furthermore, the sending condition may be sending according to a preset frequency, or sending after the client completes an attack on the honeypot platform, which is not limited here.
示例性地,按照预设频率:1小时1次、通过单向数据传输连接将攻击行为事件Logs发送至云服务端。Exemplarily, the attack behavior event Logs are sent to the cloud server through a one-way data transmission connection according to a preset frequency: once an hour.
收集客户端的攻击行为事件,将攻击行为事件发送至云服务端,以使云服务端根据攻击行为事件生成检测策略,检测策略用于项目平台上集成的访问控制组件利用检测策略识别客户端是否为异常访问客户端。提升了对客户端的识别准确度,避免项目平台受到攻击,并通过收集异常访问客户端在蜜罐平台中的攻击行为事件,对异常访问客户端进行预防和溯源,保护了项目平台上数据的安全。Collect the attack behavior events of the client, and send the attack behavior events to the cloud server, so that the cloud server can generate a detection strategy based on the attack behavior events, and the detection strategy is used by the access control component integrated on the project platform to use the detection strategy to identify whether the client is Abnormal access to the client. Improve the identification accuracy of the client, prevent the project platform from being attacked, and prevent and trace the source of the abnormal access client by collecting the attack behavior events of the abnormal access client in the honeypot platform, protecting the security of the data on the project platform .
下述结合附图4,以本说明书提供的蜜罐防护方法在web应用数据的应用为例,对蜜罐防护方法进行进一步说明。其中,图4示出了本说明书一个实施例提供的一种应用于web应用数据的蜜罐防护方法的处理过程流程图,具体包括以下步骤。The following describes the honeypot protection method further by taking the application of the honeypot protection method provided in this specification in web application data as an example in conjunction with FIG. 4 . Wherein, FIG. 4 shows a processing flow chart of a honeypot protection method applied to web application data provided by an embodiment of this specification, which specifically includes the following steps.
步骤402:接收云服务端发送的检测策略;Step 402: Receive the detection strategy sent by the cloud server;
本说明书实施例应用于web应用平台上集成的流量拦截器。The embodiment of this specification is applied to the traffic interceptor integrated on the web application platform.
检测策略是云服务端根据蜜罐平台发送的历史攻击行为事件生成的。The detection strategy is generated by the cloud server based on historical attack behavior events sent by the honeypot platform.
步骤404:接收客户端根据web应用的网络域名发送的web应用数据的访问请求,其中,web应用平台的网络域名与蜜罐平台的网络域名相同,web应用平台与蜜罐平台部署于不同的机房;Step 404: Receive the web application data access request sent by the client according to the network domain name of the web application, wherein the network domain name of the web application platform is the same as the network domain name of the honeypot platform, and the web application platform and the honeypot platform are deployed in different computer rooms ;
web应用的网络域名为对外公开的web应用的定位标识。The network domain name of the web application is the location identifier of the publicly available web application.
步骤406:解析web应用数据的访问请求,获得访问信息;Step 406: Analyzing the access request of web application data to obtain access information;
步骤408:利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端;Step 408: Use the detection strategy to detect the access information, and identify whether the client is an abnormal access client;
步骤410:若否,通过web应用数据接口将访问请求发送至web应用平台的目标web应用数据端;Step 410: If not, send the access request to the target web application data terminal of the web application platform through the web application data interface;
步骤412:接收目标web应用数据端基于访问请求返回的web应用数据;Step 412: Receive the web application data returned by the target web application data terminal based on the access request;
步骤414:将web应用数据发送至客户端;Step 414: Send the web application data to the client;
步骤416:若是,通过蜜罐接口将访问请求转发至蜜罐平台中的目标蜜罐代理端;Step 416: If yes, forward the access request to the target honeypot agent in the honeypot platform through the honeypot interface;
目标蜜罐代理端为预先构建的与web应用数据端具有高相似性的数据访问功能模块。The target honeypot agent is a pre-built data access function module that has a high similarity with the web application data end.
步骤418:接收目标蜜罐代理端基于访问请求返回的蜜饵数据;Step 418: receiving the honeybait data returned by the target honeypot agent based on the access request;
蜜饵数据为预先设置的与web应用数据具有高相似性的伪造应用数据。Honeybait data is pre-set fake application data that has a high similarity with web application data.
步骤420:将蜜饵数据发送至客户端。Step 420: Send the honeybait data to the client.
本说明书实施例中,对web应用平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性。web应用平台与蜜罐平台部署于不同的机房,使得蜜罐平台被攻克后,异常访问客户端也难以对web应用平台进行攻击,避免了蜜罐平台被当作跳板实现对web应用平台的攻击。更进一步提升了web应用平台的数据安全性,并且降低了硬件设备处理正常web应用数据访问的性能负担,提升了web应用平台的数据处理性能。利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端,提升了识别的准确性,避免了异常访问客户端对web应用平台的攻击行为,保护了web应用平台的web应用数据的数据安全。在识别到客户端为正常访问客户端时,通过web应用数据接口将访问请求发送至web应用平台的目标web应用数据端后,接收目标web应用数据端基于访问请求返回的web应用数据,保证了项目平台可以正常提供数据访问功能,保证了项目平台的稳定性。在识别到客户端为异常访问客户端时,通过蜜罐接口将访问请求转发至蜜罐平台中的目标蜜罐代理端,接收目标蜜罐代理端基于访问请求返回的蜜饵数据,并将蜜饵数据发送至所述客户端,使得异常访问客户端难以感受到蜜罐平台的存在,更进一步提升了蜜罐平台的伪装性,避免了异常访问客户端对web应用平台的攻击行为,更进一步保护了web应用平台的数据安全。In the embodiment of this specification, the same project domain name is set for the web application platform and the honeypot platform, so that the client cannot identify the honeypot platform, and the camouflage of the honeypot platform is improved. The web application platform and the honeypot platform are deployed in different computer rooms, making it difficult for abnormal access clients to attack the web application platform after the honeypot platform is captured, preventing the honeypot platform from being used as a springboard to attack the web application platform . The data security of the web application platform is further improved, and the performance burden of hardware devices for processing normal web application data access is reduced, and the data processing performance of the web application platform is improved. Use the detection strategy to detect the access information, identify whether the client is an abnormal access client, improve the accuracy of identification, avoid the attack behavior of the abnormal access client on the web application platform, and protect the web application data of the web application platform data security. When the client is identified as a normal access client, after the access request is sent to the target web application data end of the web application platform through the web application data interface, the web application data returned by the target web application data end based on the access request is received, ensuring The project platform can normally provide data access functions, which ensures the stability of the project platform. When it is recognized that the client is an abnormal access client, the access request is forwarded to the target honeypot agent in the honeypot platform through the honeypot interface, the honeypot data returned by the target honeypot agent based on the access request is received, and the honeypot The bait data is sent to the client, which makes it difficult for the abnormal access client to feel the existence of the honeypot platform, further improves the camouflage of the honeypot platform, and avoids the attack behavior of the abnormal access client on the web application platform. The data security of the web application platform is protected.
与上述方法实施例相对应,本说明书还提供了蜜罐防护系统实施例,图5示出了本说明书一个实施例提供的一种蜜罐防护系统的结构示意图。如图5所示,该系统包括项目平台502和蜜罐平台504。项目平台集成有访问控制组件5022;Corresponding to the foregoing method embodiments, this specification also provides an embodiment of a honeypot protection system, and FIG. 5 shows a schematic structural diagram of a honeypot protection system provided by an embodiment of this specification. As shown in FIG. 5 , the system includes a project platform 502 and a honeypot platform 504 . The project platform is integrated with an
访问控制组件5022,用于接收客户端根据项目域名发送的数据访问请求,其中,项目平台502与蜜罐平台504具有相同的项目域名;根据数据访问请求,识别客户端是否为异常访问客户端;若是,则将数据访问请求转发至蜜罐平台504,以使客户端对蜜罐平台504进行访问;The
蜜罐平台504,用于接收项目平台502转发的数据访问请求;根据数据访问请求,获取对应的蜜饵数据;将蜜饵数据反馈给项目平台502。The honeypot platform 504 is used to receive the data access request forwarded by the project platform 502 ; obtain corresponding honeybait data according to the data access request; and feed back the honeybait data to the project platform 502 .
可选地,该系统还包括云服务端506;Optionally, the system also includes a cloud server 506;
云服务端506,用于接收蜜罐平台504发送的客户端的攻击行为事件;根据攻击行为事件生成检测策略;将检测策略发送给项目平台502;The cloud server 506 is used to receive the attack behavior event of the client sent by the honeypot platform 504; generate a detection strategy according to the attack behavior event; send the detection strategy to the project platform 502;
访问控制组件5022,还用于接收检测策略,利用检测策略,对数据访问请求中的访问信息进行检测,识别客户端是否为异常访问客户端。The
本说明书实施例中,对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,引导更深层访问,在识别到客户端为异常访问客户端时,将数据访问请求转发至蜜罐平台,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。接收蜜罐平台发送的客户端的攻击行为事件,根据攻击行为事件生成检测策略,将检测策略发送给项目平台。提升了对客户端的识别准确度,避免项目平台受到攻击,并通过收集异常访问客户端在蜜罐平台中的攻击行为事件,对异常访问客户端进行预防和溯源,保护了项目平台上数据的安全。In the embodiment of this manual, the same project domain name is set for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform, guides deeper access, and recognizes that the client is abnormal When accessing the client, the data access request is forwarded to the honeypot platform, which avoids the attack behavior of the abnormal access client on the project platform and protects the data security of the project platform. Receive the client's attack behavior event sent by the honeypot platform, generate a detection strategy according to the attack behavior event, and send the detection strategy to the project platform. Improve the identification accuracy of the client, prevent the project platform from being attacked, and prevent and trace the source of the abnormal access client by collecting the attack behavior events of the abnormal access client in the honeypot platform, protecting the security of the data on the project platform .
上述为本实施例的一种蜜罐防护系统的示意性方案。需要说明的是,该蜜罐防护系统的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,蜜罐防护系统的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of a honeypot protection system in this embodiment. It should be noted that the technical solution of the honeypot protection system and the technical solution of the above-mentioned honeypot protection method belong to the same concept. For details not described in detail in the technical solution of the honeypot protection system, please refer to the above-mentioned honeypot protection method. Description of the technical solution.
与上述方法实施例相对应,本说明书还提供了访问控制组件实施例,图6示出了本说明书一个实施例提供的一种访问控制组件的结构示意图,访问控制组件集成于项目平台上。如图6所示,该组件包括:Corresponding to the above method embodiments, this specification also provides an embodiment of an access control component. FIG. 6 shows a schematic structural diagram of an access control component provided by an embodiment of this specification. The access control component is integrated on the project platform. As shown in Figure 6, this component includes:
第一接收模块602,被配置为接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名;The first receiving module 602 is configured to receive a data access request sent by the client according to the project domain name, wherein the project platform and the honeypot platform have the same project domain name;
识别模块604,被配置为根据数据访问请求,识别客户端是否为异常访问客户端;The identification module 604 is configured to identify whether the client is an abnormal access client according to the data access request;
转发模块606,被配置为若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。The forwarding module 606 is configured to forward the data access request to the honeypot platform if yes, so that the client can access the honeypot platform.
可选地,项目平台与蜜罐平台部署于不同的地理位置。Optionally, the project platform and the honeypot platform are deployed in different geographic locations.
可选地,该组件还包括:Optionally, the component also includes:
放行模块,被配置为若否,则允许客户端访问项目平台中的项目数据。The release module is configured to allow the client to access the project data in the project platform if not.
可选地,项目平台包括项目端;Optionally, the project platform includes a project end;
对应地,放行模块可以被进一步配置为:Correspondingly, the release module can be further configured as:
通过项目接口将数据访问请求发送至目标项目端;接收目标项目端基于数据访问请求返回的项目数据;将项目数据发送至客户端。Send the data access request to the target project side through the project interface; receive the project data returned by the target project side based on the data access request; send the project data to the client.
可选地,蜜罐平台包括蜜罐代理端;Optionally, the honeypot platform includes a honeypot agent;
对应地,转发模块606被进一步配置为:Correspondingly, the forwarding module 606 is further configured as:
通过蜜罐接口将数据访问请求转发至目标蜜罐代理端;接收目标蜜罐代理端基于数据访问请求返回的蜜饵数据;将蜜饵数据发送至客户端。Forward the data access request to the target honeypot agent through the honeypot interface; receive the honeybait data returned by the target honeypot agent based on the data access request; and send the honeybait data to the client.
可选地,该组件还包括:Optionally, the component also includes:
检测策略接收模块,被配置为接收云服务端发送的检测策略,其中,检测策略为云服务端根据蜜罐平台收集的客户端的攻击行为事件生成;The detection strategy receiving module is configured to receive the detection strategy sent by the cloud server, wherein the detection strategy is generated by the cloud server according to the attack behavior event of the client collected by the honeypot platform;
对应地,识别模块604被进一步配置为:Correspondingly, the identification module 604 is further configured to:
解析数据访问请求,获得访问信息;利用检测策略,对访问信息进行检测,识别客户端是否为异常访问客户端。Analyze data access requests to obtain access information; use detection strategies to detect access information and identify whether the client is an abnormal access client.
本说明书实施例中,接收客户端根据项目域名发送的数据访问请求,其中,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,识别客户端是否为异常访问客户端,若是,则将数据访问请求转发至蜜罐平台,以使客户端对蜜罐平台进行访问。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,引导更深层访问,在识别到客户端为异常访问客户端时,将数据访问请求转发至蜜罐平台,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。In the embodiment of this specification, the data access request sent by the client according to the project domain name is received, wherein the project platform and the honeypot platform have the same project domain name, and according to the data access request, identify whether the client is an abnormal access client, and if so, then Forward the data access request to the honeypot platform so that the client can access the honeypot platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform and guides deeper access. When the client is identified as an abnormal access client, it will Data access requests are forwarded to the honeypot platform, which avoids attacks on the project platform by abnormal access clients and protects the data security of the project platform.
上述为本实施例的一种访问控制组件的示意性方案。需要说明的是,该访问控制组件的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,访问控制组件的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of an access control component in this embodiment. It should be noted that the technical solution of the access control component and the technical solution of the above-mentioned honeypot protection method belong to the same concept, and details that are not described in detail in the technical solution of the access control component can be found in the technical solution of the above-mentioned honeypot protection method description of.
与上述方法实施例相对应,本说明书还提供了蜜罐防护装置实施例,图7示出了本说明书一个实施例提供的一种蜜罐防护装置的结构示意图,该装置应用于蜜罐平台。如图7所示,该装置包括:Corresponding to the above method embodiments, this specification also provides an embodiment of a honeypot protection device. FIG. 7 shows a schematic structural diagram of a honeypot protection device provided by an embodiment of this specification, which is applied to a honeypot platform. As shown in Figure 7, the device includes:
第二接收模块702,被配置为接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名;The second receiving module 702 is configured to receive the data access request forwarded by the project platform, wherein the data access request is sent to the project platform by the client according to the project domain name, and the project platform and the honeypot platform have the same project domain name;
获取模块704,被配置为根据数据访问请求,获取对应的蜜饵数据;The obtaining module 704 is configured to obtain corresponding honeybait data according to the data access request;
反馈模块706,被配置为将蜜饵数据反馈给项目平台。The feedback module 706 is configured to feed back the honeybait data to the project platform.
可选地,蜜罐平台与项目平台部署于不同的地理位置。Optionally, the honeypot platform and the project platform are deployed in different geographic locations.
可选地,蜜罐平台包括蜜罐代理端;Optionally, the honeypot platform includes a honeypot agent;
对应地,该装置还包括:Correspondingly, the device also includes:
访问权限确定模块,被配置为根据数据访问请求,确定客户端对目标蜜罐代理端的访问权限;在客户端对目标蜜罐代理端具有访问权限的情况下,根据访问权限,从目标蜜罐代理端获取对应的蜜饵数据。The access authority determination module is configured to determine the client's access authority to the target honeypot agent according to the data access request; when the client has access authority to the target honeypot agent, according to the access authority, from the target honeypot agent The end obtains the corresponding honeybait data.
可选地,该装置还包括:Optionally, the device also includes:
攻击行为事件发送模块,被配置为收集客户端的攻击行为事件;将攻击行为事件发送至云服务端,以使云服务端根据攻击行为事件生成检测策略,检测策略用于项目平台上集成的访问控制组件利用检测策略识别客户端是否为异常访问客户端。The attack behavior event sending module is configured to collect the attack behavior events of the client; send the attack behavior events to the cloud server, so that the cloud server can generate detection strategies according to the attack behavior events, and the detection strategies are used for integrated access control on the project platform The component uses the detection strategy to identify whether the client is an abnormal access client.
本说明书实施例中,接收项目平台转发的数据访问请求,其中,数据访问请求是客户端根据项目域名发送至项目平台的,项目平台与蜜罐平台具有相同的项目域名,根据数据访问请求,获取对应的蜜饵数据,将蜜饵数据反馈给项目平台。对项目平台与蜜罐平台设置相同的项目域名,使得客户端无法识别出蜜罐平台,根据数据访问请求,获取对应的蜜饵数据,保证了获取与项目数据高相似性的蜜饵数据,使得客户端无法识别出蜜罐平台,提升了蜜罐平台的伪装性,蜜罐平台将蜜饵数据反馈给项目平台,不与客户端直接进行数据传输,使得异常访问客户端难以感受到蜜罐平台的存在,更进一步提升了蜜罐平台的伪装性,避免了异常访问客户端对项目平台的攻击行为,保护了项目平台的数据安全。In the embodiment of this specification, the data access request forwarded by the project platform is received. The data access request is sent to the project platform by the client according to the project domain name. The project platform and the honeypot platform have the same project domain name. According to the data access request, obtain Corresponding honeybait data, feedback the honeybait data to the project platform. Set the same project domain name for the project platform and the honeypot platform, so that the client cannot identify the honeypot platform, and obtain the corresponding honeybait data according to the data access request, ensuring the acquisition of honeybait data with high similarity with the project data, making The client cannot identify the honeypot platform, which improves the camouflage of the honeypot platform. The honeypot platform feeds back the honeybait data to the project platform, and does not directly transmit data with the client, making it difficult for abnormal access clients to feel the honeypot platform The existence of the honeypot platform further enhances the camouflage of the honeypot platform, avoids the attack behavior of the abnormal access client on the project platform, and protects the data security of the project platform.
上述为本实施例的一种蜜罐防护装置的示意性方案。需要说明的是,该蜜罐防护装置的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,蜜罐防护装置的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of a honeypot protection device in this embodiment. It should be noted that the technical solution of the honeypot protection device and the technical solution of the above-mentioned honeypot protection method belong to the same concept. For details not described in detail in the technical solution of the honeypot protection device, please refer to the above-mentioned honeypot protection method. A description of the technical solution.
图8示出了根据本说明书一个实施例提供的一种计算设备的结构框图。该计算设备800的部件包括但不限于存储器810和处理器820。处理器820与存储器810通过总线830相连接,数据库850用于保存数据。Fig. 8 shows a structural block diagram of a computing device provided according to an embodiment of this specification. Components of the computing device 800 include, but are not limited to, a memory 810 and a processor 820 . The processor 820 is connected to the memory 810 through the bus 830, and the database 850 is used for storing data.
计算设备800还包括接入设备840,接入设备840使得计算设备800能够经由一个或多个网络860通信。这些网络的示例包括公用交换电话网(PSTN,Public SwitchedTelephone Network)、局域网(LAN,Local Area Network)、广域网(WAN,Wide AreaNetwork)、个域网(PAN,Personal Area Network)或诸如因特网的通信网络的组合。接入设备840可以包括有线或无线的任何类型的网络接口(例如,网络接口卡(NIC,NetworkInterface Controller))中的一个或多个,诸如IEEE802.11无线局域网(WLAN,WirelessLocal Area Networks)无线接口、全球微波互联接入(Wi-MAX,World Interoperabilityfor Microwave Access)接口、以太网接口、通用串行总线(USB,Universal Serial Bus)接口、蜂窝网络接口、蓝牙接口、近场通信(NFC,Near Field Communication)接口,等等。Computing device 800 also includes an access device 840 that enables computing device 800 to communicate via one or more networks 860 . Examples of these networks include a public switched telephone network (PSTN, Public Switched Telephone Network), a local area network (LAN, Local Area Network), a wide area network (WAN, Wide Area Network), a personal area network (PAN, Personal Area Network) or a communication network such as the Internet The combination. The access device 840 may include one or more of wired or wireless network interfaces of any type (for example, a network interface card (NIC, Network Interface Controller)), such as an IEEE802.11 wireless local area network (WLAN, WirelessLocal Area Networks) wireless interface , World Interoperability for Microwave Access (Wi-MAX, World Interoperability for Microwave Access) interface, Ethernet interface, Universal Serial Bus (USB, Universal Serial Bus) interface, cellular network interface, Bluetooth interface, near field communication (NFC, Near Field Communication) interface, and so on.
在本说明书的一个实施例中,计算设备800的上述部件以及图8中未示出的其他部件也可以彼此相连接,例如通过总线。应当理解,图8所示的计算设备结构框图仅仅是出于示例的目的,而不是对本说明书范围的限制。本领域技术人员可以根据需要,增添或替换其他部件。In an embodiment of the present specification, the above-mentioned components of the computing device 800 and other components not shown in FIG. 8 may also be connected to each other, for example, through a bus. It should be understood that the structural block diagram of the computing device shown in FIG. 8 is only for the purpose of illustration, rather than limiting the scope of this description. Those skilled in the art can add or replace other components as needed.
计算设备800可以是任何类型的静止或移动计算设备,包括移动计算机或移动计算设备(例如,平板计算机、个人数字助理、膝上型计算机、笔记本计算机、上网本等)、移动电话(例如,智能手机)、可佩戴的计算设备(例如,智能手表、智能眼镜等)或其他类型的移动设备,或者诸如台式计算机或PC的静止计算设备。计算设备800还可以是移动式或静止式的服务器。Computing device 800 can be any type of stationary or mobile computing device, including mobile computers or mobile computing devices (e.g., tablet computers, personal digital assistants, laptop computers, notebook computers, netbooks, etc.), mobile telephones (e.g., smartphones), ), wearable computing devices (eg, smart watches, smart glasses, etc.), or other types of mobile devices, or stationary computing devices such as desktop computers or PCs. Computing device 800 may also be a mobile or stationary server.
其中,处理器820用于执行如下计算机可执行指令,该计算机可执行指令被处理器执行时实现上述蜜罐防护方法的步骤。Wherein, the processor 820 is configured to execute the following computer-executable instructions. When the computer-executable instructions are executed by the processor, the steps of the above honeypot protection method are implemented.
上述为本实施例的一种计算设备的示意性方案。需要说明的是,该计算设备的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,计算设备的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of a computing device in this embodiment. It should be noted that the technical solution of the computing device and the technical solution of the above-mentioned honeypot protection method belong to the same concept. For details not described in detail in the technical solution of the computing device, please refer to the description of the technical solution of the above-mentioned honeypot protection method .
本说明书一实施例还提供一种计算机可读存储介质,其存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现上述蜜罐防护方法的步骤。An embodiment of the present specification further provides a computer-readable storage medium, which stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, the steps of the above honeypot protection method are implemented.
上述为本实施例的一种计算机可读存储介质的示意性方案。需要说明的是,该存储介质的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,存储介质的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of a computer-readable storage medium in this embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the above-mentioned honeypot protection method belong to the same concept, and the details of the technical solution of the storage medium that are not described in detail can be found in the description of the technical solution of the above-mentioned honeypot protection method .
本说明书一实施例还提供一种计算机程序,其中,当所述计算机程序在计算机中执行时,令计算机执行上述蜜罐防护方法的步骤。An embodiment of the present specification also provides a computer program, wherein, when the computer program is executed in a computer, the computer is made to execute the steps of the above honeypot protection method.
上述为本实施例的一种计算机程序的示意性方案。需要说明的是,该计算机程序的技术方案与上述的蜜罐防护方法的技术方案属于同一构思,计算机程序的技术方案未详细描述的细节内容,均可以参见上述蜜罐防护方法的技术方案的描述。The foregoing is a schematic solution of a computer program in this embodiment. It should be noted that the technical solution of the computer program and the technical solution of the above-mentioned honeypot protection method belong to the same concept, and details not described in detail in the technical solution of the computer program can be found in the description of the technical solution of the above-mentioned honeypot protection method .
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The foregoing describes specific embodiments of this specification. Other implementations are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. Multitasking and parallel processing are also possible or may be advantageous in certain embodiments.
所述计算机指令包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。The computer instructions include computer program code, which may be in source code form, object code form, executable file or some intermediate form, and the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electrical carrier signal, telecommunication signal, and software distribution medium, etc.
需要说明的是,对于前述的各方法实施例,为了简便描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本说明书实施例并不受所描述的动作顺序的限制,因为依据本说明书实施例,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定都是本说明书实施例所必须的。It should be noted that, for the sake of simplicity of description, the above-mentioned method embodiments are expressed as a series of action combinations, but those skilled in the art should know that the embodiments of this specification are not limited by the described action sequence. Because according to the embodiment of the present specification, certain steps may be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the embodiments of the specification.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。In the foregoing embodiments, the descriptions of each embodiment have their own emphases, and for parts not described in detail in a certain embodiment, reference may be made to relevant descriptions of other embodiments.
以上公开的本说明书优选实施例只是用于帮助阐述本说明书。可选实施例并没有详尽叙述所有的细节,也不限制该发明仅为所述的具体实施方式。显然,根据本说明书实施例的内容,可作很多的修改和变化。本说明书选取并具体描述这些实施例,是为了更好地解释本说明书实施例的原理和实际应用,从而使所属技术领域技术人员能很好地理解和利用本说明书。本说明书仅受权利要求书及其全部范围和等效物的限制。The preferred embodiments of the present specification disclosed above are only for helping to explain the present specification. Alternative embodiments are not exhaustive in all detail, nor are the inventions limited to specific implementations described. Obviously, many modifications and changes can be made according to the contents of the embodiments of this specification. This specification selects and specifically describes these embodiments in order to better explain the principles and practical applications of the embodiments of this specification, so that those skilled in the art can well understand and use this specification. This specification is to be limited only by the claims, along with their full scope and equivalents.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211202967.9A CN115567307A (en) | 2022-09-29 | 2022-09-29 | Honeypot protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211202967.9A CN115567307A (en) | 2022-09-29 | 2022-09-29 | Honeypot protection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115567307A true CN115567307A (en) | 2023-01-03 |
Family
ID=84742343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211202967.9A Pending CN115567307A (en) | 2022-09-29 | 2022-09-29 | Honeypot protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115567307A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8087083B1 (en) * | 2002-01-04 | 2011-12-27 | Verizon Laboratories Inc. | Systems and methods for detecting a network sniffer |
CN107426242A (en) * | 2017-08-25 | 2017-12-01 | 中国科学院计算机网络信息中心 | Network safety protection method, device and storage medium |
CN110881052A (en) * | 2019-12-25 | 2020-03-13 | 成都知道创宇信息技术有限公司 | Network security defense method, device and system and readable storage medium |
CN110995640A (en) * | 2019-09-19 | 2020-04-10 | 中国银联股份有限公司 | Method for identifying network attack and honeypot protection system |
CN112187825A (en) * | 2020-10-13 | 2021-01-05 | 网络通信与安全紫金山实验室 | Honeypot defense method, system, equipment and medium based on mimicry defense |
US20210051175A1 (en) * | 2019-08-15 | 2021-02-18 | Uchicago Argonne, Llc | Software defined networking moving target defense honeypot |
CN114640544A (en) * | 2022-05-09 | 2022-06-17 | 北京华顺信安科技有限公司 | Honeypot providing method, honeypot providing device, storage medium and electronic equipment |
CN115022077A (en) * | 2022-06-30 | 2022-09-06 | 绿盟科技集团股份有限公司 | Network threat protection method, system and computer readable storage medium |
CN115065495A (en) * | 2022-04-07 | 2022-09-16 | 京东科技信息技术有限公司 | Honeypot network operation method, device, equipment and storage medium |
-
2022
- 2022-09-29 CN CN202211202967.9A patent/CN115567307A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8087083B1 (en) * | 2002-01-04 | 2011-12-27 | Verizon Laboratories Inc. | Systems and methods for detecting a network sniffer |
CN107426242A (en) * | 2017-08-25 | 2017-12-01 | 中国科学院计算机网络信息中心 | Network safety protection method, device and storage medium |
US20210051175A1 (en) * | 2019-08-15 | 2021-02-18 | Uchicago Argonne, Llc | Software defined networking moving target defense honeypot |
CN110995640A (en) * | 2019-09-19 | 2020-04-10 | 中国银联股份有限公司 | Method for identifying network attack and honeypot protection system |
CN110881052A (en) * | 2019-12-25 | 2020-03-13 | 成都知道创宇信息技术有限公司 | Network security defense method, device and system and readable storage medium |
CN112187825A (en) * | 2020-10-13 | 2021-01-05 | 网络通信与安全紫金山实验室 | Honeypot defense method, system, equipment and medium based on mimicry defense |
CN115065495A (en) * | 2022-04-07 | 2022-09-16 | 京东科技信息技术有限公司 | Honeypot network operation method, device, equipment and storage medium |
CN114640544A (en) * | 2022-05-09 | 2022-06-17 | 北京华顺信安科技有限公司 | Honeypot providing method, honeypot providing device, storage medium and electronic equipment |
CN115022077A (en) * | 2022-06-30 | 2022-09-06 | 绿盟科技集团股份有限公司 | Network threat protection method, system and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10574698B1 (en) | Configuration and deployment of decoy content over a network | |
EP3424178B1 (en) | Deterministic reproduction of client/server computer state or output sent to one or more client computers | |
US10397273B1 (en) | Threat intelligence system | |
US11050787B1 (en) | Adaptive configuration and deployment of honeypots in virtual networks | |
US12058148B2 (en) | Distributed threat sensor analysis and correlation | |
CN103607385B (en) | Method and apparatus for security detection based on browser | |
US11489853B2 (en) | Distributed threat sensor data aggregation and data export | |
CN114145004B (en) | System and method for using DNS messages to selectively collect computer forensic data | |
US10805340B1 (en) | Infection vector and malware tracking with an interactive user display | |
US20160072847A1 (en) | Internet mediation | |
US10129289B1 (en) | Mitigating attacks on server computers by enforcing platform policies on client computers | |
Ling et al. | Protocol-level hidden server discovery | |
US10333977B1 (en) | Deceiving an attacker who is harvesting credentials | |
US10659335B1 (en) | Contextual analyses of network traffic | |
CN110213212A (en) | A kind of classification method and device of equipment | |
US20160277417A1 (en) | Method and apparatus for communication number update | |
US12041094B2 (en) | Threat sensor deployment and management | |
JP7045050B2 (en) | Communication monitoring system and communication monitoring method | |
US8085763B2 (en) | Method for protecting SIP-based applications | |
Damopoulos et al. | User privacy and modern mobile services: are they on the same path? | |
CN105550593A (en) | Cloud disk file monitoring method and device based on local area network | |
CN109819068A (en) | User terminal and its block chain domain name analytic method | |
CN110557358A (en) | Honeypot server communication method, SSLStrip man-in-the-middle attack perception method and related device | |
CN108234400A (en) | A kind of attack determines method, apparatus and Situation Awareness System | |
CN113422768A (en) | Application access method and device in zero trust and computing equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |