Paper
21 March 2023 Research on active protection technology of network attack traffic traction based on honeypot
Zheru Cai, Zhongwei Chen, Jiao Wu, Jingchu Wang, Kai Cheng, Shu Li, Yizhen Sun
Author Affiliations +
Proceedings Volume 12609, International Conference on Computer Application and Information Security (ICCAIS 2022); 1260909 (2023) https://doi.org/10.1117/12.2671829
Event: International Conference on Computer Application and Information Security (ICCAIS 2022), 2022, ONLINE, ONLINE
Abstract
As an active defense network security tool, honeypots can lure attacks and capture attack information. However, traditional honeypots can only wait for intrusion passively, and honeypots with network traffic traction function can not realize real-time optimization of diversion strategy based on attack information. Based on the survey of honeypot traceability and current situation of diversion, this paper carries out the research of network traffic traction method based on attack detection and network traffic load balancing. Through five steps of configuring network traffic traction strategy, obtaining attack alarm, comprehensive attack research and judgment, load balancing diversion, and log capture feedback, this method effectively enhances honeypot traceability and improves the level of active network security protection, and introduces the application scenario of this method with portal websites as an example. The effectiveness of the method is tested by comparing various indicators before and after the application of the method.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zheru Cai, Zhongwei Chen, Jiao Wu, Jingchu Wang, Kai Cheng, Shu Li, and Yizhen Sun "Research on active protection technology of network attack traffic traction based on honeypot", Proc. SPIE 12609, International Conference on Computer Application and Information Security (ICCAIS 2022), 1260909 (21 March 2023); https://doi.org/10.1117/12.2671829
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Defense and security

Defense technologies

Failure analysis

Computer simulations

Detection and tracking algorithms

Back to Top