CN110336811A - A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system - Google Patents

A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system Download PDF

Info

Publication number
CN110336811A
CN110336811A CN201910581198.XA CN201910581198A CN110336811A CN 110336811 A CN110336811 A CN 110336811A CN 201910581198 A CN201910581198 A CN 201910581198A CN 110336811 A CN110336811 A CN 110336811A
Authority
CN
China
Prior art keywords
honey
web site
daily record
record data
cyberthreat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910581198.XA
Other languages
Chinese (zh)
Inventor
王文彬
胡弘毅
程群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qifu Information Technology Co Ltd
Original Assignee
Shanghai Qifu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qifu Information Technology Co Ltd filed Critical Shanghai Qifu Information Technology Co Ltd
Priority to CN201910581198.XA priority Critical patent/CN110336811A/en
Publication of CN110336811A publication Critical patent/CN110336811A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The Cyberthreat analysis method based on honey pot system that the invention discloses a kind of characterized by comprising establish honey pot system, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is for simulating different types of Web site;Obtain the daily record data for accessing the Web site honey jar;The daily record data is analyzed, the data attacked different Web sites are obtained.The present invention solves the honey jar demand of internet financial field, and by Web site honey jar, analysis is directed to the network attack of internet financial field, analyzes network attack sample, obtains attacker IP list, the loophole etc. that equipment feature list, attack utilize.

Description

A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system
Technical field
The present invention relates to computer information processing fields, in particular to a kind of Cyberthreat based on honey pot system Analysis method, device, electronic equipment and computer-readable medium.
Background technique
With the development of virtualization technology, various Virtual honeypots are also developed, the prior art can by virtual machine come It realizes high interaction honey jar, and realizes business type honey jar by docker, before this, need the deployment of expensive hardware equipment Support.By using virtual technology, largely reduce the lower deployment cost of honey jar, a host can realize entire collection Data control, data capture and data analysis are in the architectural framework of multi-functional more honey jar height interaction honey nets of one.
Detection grey black production attack situation may be implemented by disposing multiple integrated honey pot systems in internet, find grey black Attack source IP data are produced, attack sample is obtained, will be seen that the newest attack in internet by producing attack sample analysis to grey black Form obtains related information, and timely early warning.
Present mainstream honey jar platform mainly integrates various open source honey pot system, and the unified pipe of the data that honey jar is obtained Reason, honey pot system include low interactive honey jar, high interaction honey jar, and functionally dividing has industry control honey jar, SSH honey jar, Web honey jar Deng although a large amount of attack information can be collected, and without the specific aim applied to internet finance.
Summary of the invention
The technical problem to be solved by the present invention is to how to utilize Web site honey jar, to analyze the net of internet financial platform Network threatens and network attack.
An aspect of of the present present invention provides a kind of Cyberthreat analysis method based on honey pot system, comprising:
Honey pot system is established, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is for simulating not The Web site of same type;
Obtain the daily record data for accessing the Web site honey jar;
The daily record data is analyzed, the data attacked different Web sites are obtained.
A preferred embodiment of the invention, described to establish honey pot system, the honey pot system includes multiple Web Website honey jar, each Web site honey jar are used to simulate different types of Web site, further comprise:
The honey pot system including multiple Web site honey jars is established by Docker.
A preferred embodiment of the invention, further includes: by internet financial web site template, build Web net It stands honey jar.
A preferred embodiment of the invention, it is described to obtain the daily record data for accessing the Web site honey jar, into One step includes:
By firewall, the daily record data of access Web site honey jar is obtained;Or
By intruding detection system IDS, the daily record data of access Web site honey jar is obtained;Or
By honey jar host, the daily record data of access Web site honey jar is obtained.
A preferred embodiment of the invention, further includes: establish the database for storing the daily record data.
Different Web sites are attacked in a preferred embodiment of the invention, the analysis daily record data, acquisition The data hit further comprise:
The behavioral data of visitor in daily record data is analyzed, characteristic information relevant to Cyberthreat is extracted, is obtained to not With the data of Web site attack.
A preferred embodiment of the invention, it is described to extract characteristic information relevant to Cyberthreat, further Include:
Extract network attack keyword relevant to Cyberthreat.
Different Web sites are attacked in a preferred embodiment of the invention, the analysis daily record data, acquisition The data hit, further includes:
According to the characteristic information relevant to Cyberthreat extracted, Cyberthreat record log is obtained;
By analyzing Cyberthreat record log, tool, method and the path for executing Cyberthreat are obtained.
A preferred embodiment of the invention, further includes: distribute ID for the visitor of the honey pot system.
The second aspect of the present invention provides a kind of Cyberthreat analytical equipment based on machine learning, comprising:
Honey pot system establishes module, and for establishing honey pot system, the honey pot system includes multiple Web site honey jars, respectively Web site honey jar is for simulating different types of Web site;
Daily record data trapping module, for obtaining the daily record data for accessing the Web site honey jar;
Cyberthreat analysis module obtains the data attacked different Web sites for analyzing the daily record data.
A preferred embodiment of the invention, the honey pot system establish module, further comprise:
Honey pot system establishes unit, for establishing the honey pot system including multiple Web site honey jars by Docker.
A preferred embodiment of the invention, further includes: Web site honey jar builds unit, passes through internet gold Melt website form, builds Web site honey jar.
A preferred embodiment of the invention, the daily record data trapping module further comprise:
Firewall unit, for obtaining the daily record data of access Web site honey jar by firewall;Or
IDS unit, for obtaining the daily record data of access Web site honey jar by intruding detection system IDS;Or
Honey jar main computer unit, for obtaining the daily record data of access Web site honey jar by honey jar host.
A preferred embodiment of the invention, further includes: database module stores the log number for establishing According to database.
A preferred embodiment of the invention, the daily record data trapping module further comprise: characteristic information Extraction unit extracts characteristic information relevant to Cyberthreat, obtains for analyzing the behavioral data of visitor in daily record data To the data of different Web sites attack.
A preferred embodiment of the invention, feature information extraction unit further comprise: network attack is crucial Word extracts subelement, for extracting network attack keyword relevant to Cyberthreat.
A preferred embodiment of the invention, the daily record data trapping module, further includes:
Cyberthreat record log acquiring unit, for obtaining according to the characteristic information relevant to Cyberthreat extracted Take Cyberthreat record log;
Cyberthreat record log analytical unit, for obtaining and executing network prestige by analysis Cyberthreat record log Tool, method and the path of the side of body.
A preferred embodiment of the invention, further includes: ID distribution module, for the visit for the honey pot system The person of asking distributes ID.
The third aspect of the present invention provides a kind of electronic equipment, wherein the electronic equipment includes: processor;And
The memory of computer executable instructions is stored, the executable instruction when executed executes the processor Described in any item methods.
The fourth aspect of the present invention provides a kind of computer readable storage medium, wherein the computer-readable storage medium Matter stores one or more programs, and one or more of programs when being executed by a processor, realize described in any item methods.
Technical solution of the present invention has the following beneficial effects:
The present invention solves the honey jar demand of internet financial field, and by Web site honey jar, analysis is for internet finance The network attack in field analyzes network attack sample, understands newest attack form, obtains attacker IP list, equipment feature name The loophole etc. that single, attack utilizes.
Cyberthreat analysis method based on honey pot system of the invention solves the difficult point of defending against network attacks, identifies net Network attack, enhancing internet financial company resist the ability of network attack.
Detailed description of the invention
In order to keep technical problem solved by the invention, the technological means of use and the technical effect of acquirement clearer, Detailed description of the present invention specific embodiment below with reference to accompanying drawings.But it need to state, drawings discussed below is only this The attached drawing of invention exemplary embodiment of the present, to those skilled in the art, before not making the creative labor It puts, the attached drawing of other embodiments can be obtained according to these attached drawings.
Fig. 1 is the Cyberthreat analysis method flow diagram of the invention based on honey pot system;
Fig. 2 is the Cyberthreat analytical equipment module architectures signal based on honey pot system of a specific embodiment of the invention Figure;
Fig. 3 is that the honey pot system of the Cyberthreat analytical equipment of the invention based on honey pot system establishes module architectures signal Figure;
Fig. 4 is the honey pot system configuration diagram of the Cyberthreat analytical equipment of the invention based on honey pot system;
Fig. 5 is the daily record data of the Cyberthreat analytical equipment based on honey pot system of a specific embodiment of the invention Trapping module configuration diagram;
Fig. 6 is the log number of the Cyberthreat analytical equipment based on honey pot system of another specific embodiment of the invention According to trapping module configuration diagram;
Fig. 7 is that the Cyberthreat analytical equipment module architectures based on honey pot system of another specific embodiment of the invention show It is intended to;
Fig. 8 is the electronic devices structure block schematic illustration of the user's registration of the invention based on machine learning;
Fig. 9 is computer readable storage medium schematic diagram of the invention.
Specific embodiment
Exemplary embodiment of the present invention is described more fully with reference to the drawings.However, exemplary embodiment can Implement in a variety of forms, and is understood not to that present invention is limited only to embodiments set forth herein.On the contrary, it is exemplary to provide these Embodiment enables to the present invention more full and complete, easily facilitates the technology that inventive concept is comprehensively communicated to this field Personnel.Identical appended drawing reference indicates same or similar element, component or part in figure, thus will omit weight to them Multiple description.
Under the premise of meeting technical concept of the invention, the feature described in some specific embodiment, structure, spy Property or other details be not excluded for can be combined in any suitable manner in one or more other embodiments.
In the description for specific embodiment, feature, structure, characteristic or the other details that the present invention describes are to make Those skilled in the art fully understands embodiment.But, it is not excluded that those skilled in the art can practice this hair Bright technical solution is one or more without special characteristic, structure, characteristic or other details.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Although it should be understood that may indicate the attribute of number using first, second, third, etc. to describe various devices herein Part, element, component or part, but this should not be limited by these attributes.These attributes are to distinguish one and another one.Example Such as, the first device is also referred to as the second device without departing from the technical solution of essence of the invention.
Term "and/or" or " and/or " include associated listing all of any of project and one or more Combination.
Honeypot Techniques are a kind of deception invaders to reach acquisition hacker attack method and true host object is protected to lure Deceive technology.
Virtual honeypot can by it is a kind of it is quick in a manner of configure several honey jars, Virtual honeypot software can imitate IP stack, OS, With the application program of real system, once you establish your Virtual Honeypot System, it captured it is rear you be also easy to weight It builds.Under normal conditions, imitation is realized in memory completely.Virtual honeypot software also allows to match on single physical host A complete close net is set, a Virtual Honeypot System can be used to imitate thousands of a systems, and each system uses thousands of A ports up to ten thousand and the different IP of use.
Docker is the application container engine of an open source, and developer can be packaged their application and rely on packet and arrives In one transplantable container, then it is published on the Linux machine of any prevalence, also may be implemented to virtualize.Container has been Sandbox mechanism is entirely used, does not have any interface between each other.
By the present invention in that disposing the Web site honey jar of multiple and different types with Docker, and full dose is retained grey black production and attacked Flow is hit, and periodically honey jar is reset.By analysis, identification attacker is reptile instrument or the positive frequentation of web browser It asks, unique identification is carried out to access attacker using canvas device-fingerprint information.
The grey black produces, and refers to that telecommunication fraud, fishing website, trojan horse, hacker extort etc. to carry out using network and disobeys The behavior of method criminal activity.Slightly different, " black production " refers to the network crime for directly offending state's laws, " ash produce " then It is migration at law edge, often provides the dispute behavior of auxiliary for " black production ".
The device-fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.
Fig. 1 is the Cyberthreat analysis method flow diagram of the invention based on honey pot system;As shown in Figure 1, this hair Bright method includes:
S1: establishing honey pot system, and the honey pot system includes multiple Web site honey jars, and each Web site honey jar is for simulating Different types of Web site.
Wherein, described to establish honey pot system, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is used In simulating different types of Web site, further comprise:
The honey pot system including multiple Web site honey jars is established by Docker.
Described to establish honey pot system, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is used for mould Intend different types of Web site, further includes:
By internet financial web site template, Web site honey jar is built.
S2: the daily record data for accessing the Web site honey jar is obtained.
Wherein, described to obtain the daily record data for accessing the Web site honey jar, further comprise:
By firewall, the daily record data of access Web site honey jar is obtained;Or
By intruding detection system IDS, the daily record data of access Web site honey jar is obtained;Or
By honey jar host, the daily record data of access Web site honey jar is obtained.
Wherein, after getting the daily record data for accessing the Web site honey jar, further includes: establish described for storing The database of daily record data.
S3: analyzing the daily record data, obtains the data attacked different Web sites.
Wherein, the analysis daily record data, obtains the data attacked different Web sites, further comprises: analysis The behavioral data of visitor in daily record data extracts characteristic information relevant to Cyberthreat, obtains and attacks different Web sites Data.
Further, described to extract characteristic information relevant to Cyberthreat, comprising: to extract net relevant to Cyberthreat Network attacks keyword.
Wherein, after getting extraction characteristic information relevant to Cyberthreat, further includes:
According to the characteristic information relevant to Cyberthreat extracted, Cyberthreat record log is obtained;
By analyzing Cyberthreat record log, tool, method and the path for executing Cyberthreat are obtained.
Cyberthreat analysis method based on machine learning of the invention, further includes: be the visitor of the honey pot system Distribute ID.
As an example, the present invention, which builds multiple internet financial platform website forms by Docker simulation, realizes the honey jar System, and actual website environment is disposed as desired.
In addition to this, method of the invention distributes a unique ID by canvas fingerprint technique for each visitor.
According to the ID of visitor, the flowing of access of visitor is stored in the Elasticsearch database built up in advance, In, access data include the Header information of request, visitor ip, request the information such as data, these data are that data are analyzed Data source is provided.
As an example, obtaining the daily record data that attacker accesses internet financial web site honey jar.
Wherein, by firewall, intruding detection system IDS, and/or honey jar host, it is different to obtain access Web site honey jar The different daily record datas of node.
After the daily record data for getting access internet financial web site honey jar, the daily record data generated in database is carried out Analysis establishes grey black and produces keywords database, produces attack keyword according to grey black, extracts the attack logs in website, restore network prestige Path is coerced, and analyzes grey black and produces attack tool, method.
The honey jar is realized by building multiple internet financial platform website forms, and grey black produces attack and visits the honey jar It asks, system will record down the equipment feature of the hacker, and hacker may carry out black production to the website and permeate, including set foot-point, scan, The hacker's behaviors such as attack, bug excavation are attempted, the data on flows of these behaviors can carry out full dose preservation in log module, be saved in Database.
By data analysis system, the keyword for producing attack to grey black is analyzed, including attack keyword, is such as infused Enter the keywords such as attack, vulnerability scanning, loophole trial, also includes the discovery that hacker hits library, the number of sweeping feature.It is obtained according to data analysis Hacker IP, attack are taken, and makes attack early warning.
The present invention solves the honey jar demand of internet financial field, and by Web site honey jar, analysis is for internet finance The network attack in field analyzes network attack sample, understands newest attack form, obtains attacker IP list, equipment feature name The loophole etc. that single, attack utilizes.
Cyberthreat analysis method based on honey pot system of the invention solves the difficult point of defending against network attacks, identifies net Network attack, enhancing internet financial company resist the ability of network attack.
It will be understood by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as by computer The program (computer program) that data processing equipment executes.It is performed in the computer program, offer of the present invention is provided The above method.Moreover, the computer program can store in computer readable storage medium, which can be with It is the readable storage medium storing program for executing such as disk, CD, ROM, RAM, is also possible to the storage array of multiple storage medium compositions, such as disk Or tape storage array.The storage medium is not limited to centralised storage, is also possible to distributed storage, such as based on cloud The cloud storage of calculating.
The device of the invention embodiment is described below, which can be used for executing embodiment of the method for the invention.For Details described in apparatus of the present invention embodiment should be regarded as the supplement for above method embodiment;For in apparatus of the present invention Undisclosed details in embodiment is referred to above method embodiment to realize.
It will be understood by those skilled in the art that each module in above-mentioned apparatus embodiment can be distributed in device according to description In, corresponding change can also be carried out, is distributed in one or more devices different from above-described embodiment.The mould of above-described embodiment Block can be merged into a module, can also be further split into multiple submodule.
Fig. 2 is the Cyberthreat analytical equipment module architectures signal based on honey pot system of a specific embodiment of the invention Figure;As shown in Fig. 2, the Cyberthreat analytical equipment of the invention based on machine learning, comprising: honey pot system establishes module, day Will data capture module, Cyberthreat analysis module.
Honey pot system establishes module, and for establishing honey pot system, the honey pot system includes multiple Web site honey jars, respectively Web site honey jar is for simulating different types of Web site.
Daily record data trapping module, for obtaining the daily record data for accessing the Web site honey jar.
Cyberthreat analysis module obtains the data attacked different Web sites for analyzing the daily record data.
Fig. 3 is that the honey pot system of the Cyberthreat analytical equipment of the invention based on honey pot system establishes module architectures signal Figure;As shown in figure 3, honey pot system establishes module, further comprise: honey pot system establishes unit, for being established by Docker The honey pot system including multiple Web site honey jars.
Further, honey pot system establishes module, further includes:
Web site honey jar builds unit, by internet financial web site template, builds Web site honey jar.
Fig. 4 is the honey pot system configuration diagram of the Cyberthreat analytical equipment of the invention based on honey pot system;Such as Fig. 4 Shown, honey pot system of the invention includes multiple Web site honey jars, and each Web site honey jar is virtual internet financial web site.
Fig. 5 is the daily record data of the Cyberthreat analytical equipment based on honey pot system of a specific embodiment of the invention Trapping module configuration diagram;As shown in figure 5, daily record data trapping module of the invention, further comprises: firewall unit, IDS unit, honey jar main computer unit.
Firewall unit, for obtaining the daily record data of access Web site honey jar by firewall.
IDS unit, for obtaining the daily record data of access Web site honey jar by intruding detection system IDS.
Honey jar main computer unit, for obtaining the daily record data of access Web site honey jar by honey jar host.
Fig. 6 is the log number of the Cyberthreat analytical equipment based on honey pot system of another specific embodiment of the invention According to trapping module configuration diagram;As shown in fig. 6, daily record data trapping module of the invention, not only includes: firewall unit, IDS unit, honey jar main computer unit, further includes: feature information extraction unit, Cyberthreat record log acquiring unit, network prestige Coerce record log analytical unit.
Feature information extraction unit extracts and Cyberthreat phase for analyzing the behavioral data of visitor in daily record data The characteristic information of pass obtains the data attacked different Web sites.
Wherein, feature information extraction unit further comprises: network attack keyword extraction subelement, for extract with The relevant network attack keyword of Cyberthreat.
Cyberthreat record log acquiring unit, for obtaining according to the characteristic information relevant to Cyberthreat extracted Take Cyberthreat record log.
Cyberthreat record log analytical unit, for obtaining and executing network prestige by analysis Cyberthreat record log Tool, method and the path of the side of body.
Fig. 7 is that the Cyberthreat analytical equipment module architectures based on honey pot system of another specific embodiment of the invention show It is intended to, as shown in fig. 7, the Cyberthreat analytical equipment of the invention based on machine learning, not only includes: that honey pot system establishes mould Block, daily record data trapping module, Cyberthreat analysis module further include database module, and/or ID distribution module.
Database module, for establishing the database for storing the daily record data.
ID distribution module, for distributing ID for the visitor of the honey pot system.
Electronic equipment embodiment of the invention is described below, which can be considered as the method for aforementioned present invention With the specific entity embodiment of Installation practice.For details described in electronic equipment embodiment of the present invention, should be regarded as pair In the above method or the supplement of Installation practice;For undisclosed details, Ke Yican in electronic equipment embodiment of the present invention It is realized according to the above method or Installation practice.
Fig. 8 is the structural block diagram of the exemplary embodiment of a kind of electronic equipment according to the present invention.It is retouched referring to Fig. 8 State the electronic equipment 200 of the embodiment according to the present invention.The electronic equipment 200 that Fig. 8 is shown is only an example, should not be right The function and use scope of the embodiment of the present invention bring any restrictions.
As shown in fig. 7, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210 Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of inventing various illustrative embodiments.For example, the processing unit 210 can execute step as shown in Figure 1.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205 Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited In: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art it can be readily appreciated that the present invention describe it is exemplary Embodiment can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to this hair The technical solution of bright embodiment can be embodied in the form of software products, which can store calculates at one In the readable storage medium of machine (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that one Platform calculates equipment (can be personal computer, server or network equipment etc.) and executes according to the above method of the present invention.When When the computer program is executed by a data processing equipment so that the computer-readable medium can be realized it is of the invention upper State method, it may be assumed that establish honey pot system, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is for simulating Different types of Web site;Obtain the daily record data for accessing the Web site honey jar;The daily record data is analyzed, is obtained to not With the data of Web site attack.
The computer program can store on one or more computer-readable mediums, as shown in Figure 9.Computer can Reading medium can be readable signal medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, Optical, electromagnetic, the system of infrared ray or semiconductor, device or device, or any above combination.Readable storage medium storing program for executing is more Specific example (non exhaustive list) includes: the electrical connection with one or more conducting wires, portable disc, hard disk, deposits at random It is access to memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable Compact disk read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In conclusion the present invention can be implemented in hardware, or the software to run on one or more processors Module is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that micro process can be used in practice The communications data processing units such as device or digital signal processor (DSP) come realize according to embodiments of the present invention in it is some or The some or all functions of whole components.The present invention is also implemented as a part for executing method as described herein Or whole device or device program (for example, computer program and computer program product).Such realization present invention Program can store on a computer-readable medium, or may be in the form of one or more signals.Such letter It number can be downloaded from an internet website to obtain, be perhaps provided on the carrier signal or be provided in any other form.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects It describes in detail bright, it should be understood that the present invention is not inherently related to any certain computer, virtual bench or electronic equipment, various The present invention also may be implemented in fexible unit.The above is only a specific embodiment of the present invention, is not limited to this hair Bright, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention Protection scope within.

Claims (10)

1. a kind of Cyberthreat analysis method based on honey pot system characterized by comprising
Honey pot system is established, the honey pot system includes multiple Web site honey jars, and each Web site honey jar is for simulating inhomogeneity The Web site of type;
Obtain the daily record data for accessing the Web site honey jar;
The daily record data is analyzed, the data attacked different Web sites are obtained.
2. the method as described in claim 1, which is characterized in that described to establish honey pot system, the honey pot system includes multiple Web site honey jar, each Web site honey jar are used to simulate different types of Web site, further comprise:
The honey pot system including multiple Web site honey jars is established by Docker.
3. such as method of any of claims 1-2, which is characterized in that further include:
By internet financial web site template, Web site honey jar is built.
4. method as claimed in any one of claims 1-3, which is characterized in that the acquisition accesses the Web site honey jar Daily record data, further comprise:
By firewall, the daily record data of access Web site honey jar is obtained;Or
By intruding detection system IDS, the daily record data of access Web site honey jar is obtained;Or
By honey jar host, the daily record data of access Web site honey jar is obtained.
5. such as method of any of claims 1-4, which is characterized in that further include:
Establish the database for storing the daily record data.
6. method according to any one of claims 1 to 5, which is characterized in that the analysis daily record data, acquisition pair The data of different Web site attacks further comprise:
The behavioral data of visitor in daily record data is analyzed, characteristic information relevant to Cyberthreat is extracted, is obtained to different Web The data of website attack.
7. such as method of any of claims 1-6, which is characterized in that described to extract feature relevant to Cyberthreat Information further comprises:
Extract network attack keyword relevant to Cyberthreat.
8. a kind of Cyberthreat analytical equipment based on machine learning characterized by comprising
Honey pot system establishes module, and for establishing honey pot system, the honey pot system includes multiple Web site honey jars, each Web net Honey jar of standing is for simulating different types of Web site;
Daily record data trapping module, for obtaining the daily record data for accessing the Web site honey jar;
Cyberthreat analysis module obtains the data attacked different Web sites for analyzing the daily record data.
9. a kind of electronic equipment, wherein the electronic equipment includes:
Processor;And
The memory of computer executable instructions is stored, the executable instruction makes the processor execute basis when executed Method of any of claims 1-7.
10. a kind of computer readable storage medium, wherein the computer-readable recording medium storage one or more program, One or more of programs when being executed by a processor, realize method of any of claims 1-7.
CN201910581198.XA 2019-06-29 2019-06-29 A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system Pending CN110336811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910581198.XA CN110336811A (en) 2019-06-29 2019-06-29 A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910581198.XA CN110336811A (en) 2019-06-29 2019-06-29 A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system

Publications (1)

Publication Number Publication Date
CN110336811A true CN110336811A (en) 2019-10-15

Family

ID=68144597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910581198.XA Pending CN110336811A (en) 2019-06-29 2019-06-29 A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system

Country Status (1)

Country Link
CN (1) CN110336811A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912887A (en) * 2019-11-22 2020-03-24 上海交通大学 Bro-based APT monitoring system and method
CN111125702A (en) * 2019-12-25 2020-05-08 成都知道创宇信息技术有限公司 Virus identification method and device
CN111859234A (en) * 2020-06-03 2020-10-30 北京神州泰岳智能数据技术有限公司 Illegal content identification method and device, electronic equipment and storage medium
CN111885020A (en) * 2020-07-08 2020-11-03 福建奇点时空数字科技有限公司 Network attack behavior real-time capturing and monitoring system with distributed architecture
CN111885041A (en) * 2020-07-17 2020-11-03 福建奇点时空数字科技有限公司 Attack scene reconstruction method based on honeypot threat data
CN111901325A (en) * 2020-07-20 2020-11-06 杭州安恒信息技术股份有限公司 Service expansion method and device for honeypot node, electronic device and storage medium
CN112134837A (en) * 2020-08-06 2020-12-25 瑞数信息技术(上海)有限公司 Method and system for detecting Web attack behavior
CN113542262A (en) * 2021-07-13 2021-10-22 北京华圣龙源科技有限公司 Intelligent early warning method and device for information security threat of information system
CN113965412A (en) * 2021-11-22 2022-01-21 国家电网公司华中分部 Method for analyzing and aggregating system of honeypot attack stage
CN115802356A (en) * 2023-02-07 2023-03-14 北京航天驭星科技有限公司 Data processing method, system, device and medium for satellite ground station management system
CN115833922A (en) * 2023-02-16 2023-03-21 北京航天驭星科技有限公司 Data processing method, system, equipment and medium for satellite ground station task plan
CN116074080A (en) * 2023-01-28 2023-05-05 北京航天驭星科技有限公司 Data processing method and platform of satellite ground station management system
CN116074105A (en) * 2023-02-06 2023-05-05 鹏城实验室 Network attack data set construction method and device, electronic equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
CN103746956A (en) * 2012-09-28 2014-04-23 瞻博网络公司 Virtual honeypot
CN104021344A (en) * 2014-05-14 2014-09-03 南京大学 Honey pot mechanism and method used for collecting and intercepting internal storage behaviors of computer
US20150067848A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Detecting automated site scans
CN105933268A (en) * 2015-11-27 2016-09-07 ***股份有限公司 Webshell detection method and apparatus based on total access log analysis
CN107566409A (en) * 2017-10-20 2018-01-09 携程旅游网络技术(上海)有限公司 Local area network scan behavioral value method, apparatus, electronic equipment, storage medium
CN107612924A (en) * 2017-09-30 2018-01-19 北京奇虎科技有限公司 Attacker's localization method and device based on wireless network invasion
CN107707576A (en) * 2017-11-28 2018-02-16 深信服科技股份有限公司 A kind of network defense method and system based on Honeypot Techniques
CN108900467A (en) * 2018-05-31 2018-11-27 华东师范大学 A method of perception is built and threatened to the automation honey jar based on Docker
CN108989101A (en) * 2018-07-04 2018-12-11 北京奇艺世纪科技有限公司 A kind of log output system, method and electronic equipment
CN109347794A (en) * 2018-09-06 2019-02-15 国家电网有限公司 A kind of Web server safety defense method
CN109561051A (en) * 2017-09-26 2019-04-02 中兴通讯股份有限公司 Content distributing network safety detection method and system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device
CN102739647A (en) * 2012-05-23 2012-10-17 国家计算机网络与信息安全管理中心 High-interaction honeypot based network security system and implementation method thereof
CN103746956A (en) * 2012-09-28 2014-04-23 瞻博网络公司 Virtual honeypot
US20150067848A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Detecting automated site scans
CN104021344A (en) * 2014-05-14 2014-09-03 南京大学 Honey pot mechanism and method used for collecting and intercepting internal storage behaviors of computer
CN105933268A (en) * 2015-11-27 2016-09-07 ***股份有限公司 Webshell detection method and apparatus based on total access log analysis
CN109561051A (en) * 2017-09-26 2019-04-02 中兴通讯股份有限公司 Content distributing network safety detection method and system
CN107612924A (en) * 2017-09-30 2018-01-19 北京奇虎科技有限公司 Attacker's localization method and device based on wireless network invasion
CN107566409A (en) * 2017-10-20 2018-01-09 携程旅游网络技术(上海)有限公司 Local area network scan behavioral value method, apparatus, electronic equipment, storage medium
CN107707576A (en) * 2017-11-28 2018-02-16 深信服科技股份有限公司 A kind of network defense method and system based on Honeypot Techniques
CN108900467A (en) * 2018-05-31 2018-11-27 华东师范大学 A method of perception is built and threatened to the automation honey jar based on Docker
CN108989101A (en) * 2018-07-04 2018-12-11 北京奇艺世纪科技有限公司 A kind of log output system, method and electronic equipment
CN109347794A (en) * 2018-09-06 2019-02-15 国家电网有限公司 A kind of Web server safety defense method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾召鹏: "面向防御的网络欺骗技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912887B (en) * 2019-11-22 2021-08-20 上海交通大学 Bro-based APT monitoring system and method
CN110912887A (en) * 2019-11-22 2020-03-24 上海交通大学 Bro-based APT monitoring system and method
CN111125702A (en) * 2019-12-25 2020-05-08 成都知道创宇信息技术有限公司 Virus identification method and device
CN111859234A (en) * 2020-06-03 2020-10-30 北京神州泰岳智能数据技术有限公司 Illegal content identification method and device, electronic equipment and storage medium
CN111885020A (en) * 2020-07-08 2020-11-03 福建奇点时空数字科技有限公司 Network attack behavior real-time capturing and monitoring system with distributed architecture
CN111885041A (en) * 2020-07-17 2020-11-03 福建奇点时空数字科技有限公司 Attack scene reconstruction method based on honeypot threat data
CN111901325B (en) * 2020-07-20 2022-11-15 杭州安恒信息技术股份有限公司 Service extension method and device for honeypot nodes, electronic device and storage medium
CN111901325A (en) * 2020-07-20 2020-11-06 杭州安恒信息技术股份有限公司 Service expansion method and device for honeypot node, electronic device and storage medium
CN112134837A (en) * 2020-08-06 2020-12-25 瑞数信息技术(上海)有限公司 Method and system for detecting Web attack behavior
CN113542262A (en) * 2021-07-13 2021-10-22 北京华圣龙源科技有限公司 Intelligent early warning method and device for information security threat of information system
CN113965412A (en) * 2021-11-22 2022-01-21 国家电网公司华中分部 Method for analyzing and aggregating system of honeypot attack stage
CN116074080A (en) * 2023-01-28 2023-05-05 北京航天驭星科技有限公司 Data processing method and platform of satellite ground station management system
CN116074080B (en) * 2023-01-28 2023-06-16 北京航天驭星科技有限公司 Data processing method and platform of satellite ground station management system
CN116074105A (en) * 2023-02-06 2023-05-05 鹏城实验室 Network attack data set construction method and device, electronic equipment and storage medium
CN115802356A (en) * 2023-02-07 2023-03-14 北京航天驭星科技有限公司 Data processing method, system, device and medium for satellite ground station management system
CN115802356B (en) * 2023-02-07 2023-04-11 北京航天驭星科技有限公司 Data processing method, system, device and medium for satellite ground station management system
CN115833922A (en) * 2023-02-16 2023-03-21 北京航天驭星科技有限公司 Data processing method, system, equipment and medium for satellite ground station task plan

Similar Documents

Publication Publication Date Title
CN110336811A (en) A kind of Cyberthreat analysis method, device and electronic equipment based on honey pot system
US9998491B2 (en) Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
US9253208B1 (en) System and method for automated phishing detection rule evolution
Costin et al. A {Large-scale} analysis of the security of embedded firmwares
CN107547555A (en) A kind of web portal security monitoring method and device
CN107070929A (en) A kind of industry control network honey pot system
CN112685737A (en) APP detection method, device, equipment and storage medium
CN108701066A (en) Automatic honey jar supply system
US9948666B2 (en) Forecasting and classifying cyber-attacks using analytical data based neural embeddings
CN102088379A (en) Detecting method and device of client honeypot webpage malicious code based on sandboxing technology
CN107885777A (en) A kind of control method and system of the crawl web data based on collaborative reptile
CN104683394A (en) Cloud computing platform database benchmark test system for new technology and method thereof
US20180084004A1 (en) Forecasting and classifying cyber-attacks using crossover neural embeddings
US11695791B2 (en) System for extracting, classifying, and enriching cyber criminal communication data
CN113496033A (en) Access behavior recognition method and device and storage medium
US9866580B2 (en) Forecasting and classifying cyber-attacks using neural embeddings
US10230751B2 (en) Forecasting and classifying cyber attacks using neural embeddings migration
CN110149307A (en) A kind of IDC safety management system
Hemdan et al. Spark-based log data analysis for reconstruction of cybercrime events in cloud environment
CN104683382A (en) Benchmark testing system for cloud computing platform database of novel innovative algorithm
CN111355628A (en) Model training method, business recognition device and electronic device
Eldos et al. On the KDD'99 Dataset: Statistical Analysis for Feature Selection
Li et al. Understanding security risks of embedded devices through fine-grained firmware fingerprinting
Zammit A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
CN110348438A (en) A kind of picture character identifying method, device and electronic equipment based on artificial nerve network model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201500 room a3-5588, 58 Fumin Branch Road, Hengsha Township, Chongming District, Shanghai (Shanghai Hengtai Economic Development Zone)

Applicant after: Qifu Shuke (Shanghai) Technology Co.,Ltd.

Address before: 201500 room a3-5588, 58 Fumin Branch Road, Hengsha Township, Chongming District, Shanghai (Shanghai Hengtai Economic Development Zone)

Applicant before: Shanghai Qifu Information Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20191015