会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • A HONEYPOT HOST
    • 一个HONEYPOT主机
    • WO2010030169A2
    • 2010-03-18
    • PCT/MY2009/000145
    • 2009-09-11
    • MIMOS BHD.WIRA, Zanoramy Ansiry ZakariaSITI, Rohaidah AhmadARNIYATI, AhmadABDUL MUZAIRE, Abdul MutalibNORAZAH, Abdul Aziz
    • WIRA, Zanoramy Ansiry ZakariaSITI, Rohaidah AhmadARNIYATI, AhmadABDUL MUZAIRE, Abdul MutalibNORAZAH, Abdul Aziz
    • G06F9/44G06F13/00G06F15/16G06F9/22
    • H04L63/1441H04L63/1491
    • The present invention relates to a honeypot host (500) adapted in a network (90). The honeypot host (500) of the present invention is generally comprised of a computer system (10) and a honeypot system (300) incorporated in the computer system (10). The honeypot system (300) generally deploys at least one decoy host 80 to at least one unused Internet Protocol (IP) address (160) around the network (90). The honeypot system (300) is further adapted to be self-replicable. In the event that a honeypot system (300) in the network (90) is compromised, the honeypot system (300) is capable of self-terminating at least a portion of the compromised honeypot system (300) and self-replicating a new honeypot system (300). The honeypot system (300) is also further adapted to detect whether the current honeypot system (300) has been compromised. The present invention is also related in another aspect to a method for replicating a honeypot system (300) to replace a compromised honeypot system (300).
    • 本发明涉及适用于网络(90)中的蜜罐主机(500)。 本发明的蜜罐主机(500)通常包括并入计算机系统(10)中的计算机系统(10)和蜜罐系统(300)。 蜜罐系统(300)通常将至少一个诱骗主机80部署到网络(90)周围的至少一个未使用的互联网协议(IP)地址(160)。 蜜罐系统(300)还适于是可自我复制的。 在网络(90)中的蜜罐系统(300)受到危害的情况下,蜜罐系统(300)能够自我终止受损蜜罐系统(300)的至少一部分并且自我复制新的蜜罐 系统(300)。 蜜罐系统(300)还适于检测当前蜜罐系统(300)是否已经被破坏。 本发明在另一方面还涉及用于复制蜜罐系统(300)以替换受损蜜罐系统(300)的方法。
    • 2. 发明申请
    • A HONEYPOT HOST
    • 一个HONEYPOT主机
    • WO2010030169A3
    • 2010-07-01
    • PCT/MY2009000145
    • 2009-09-11
    • MIMOS BHDWIRA ZANORAMY ANSIRY ZAKARIASITI ROHAIDAH AHMADARNIYATI AHMADABDUL MUZAIRE ABDUL MUTALIBNORAZAH ABDUL AZIZ
    • WIRA ZANORAMY ANSIRY ZAKARIASITI ROHAIDAH AHMADARNIYATI AHMADABDUL MUZAIRE ABDUL MUTALIBNORAZAH ABDUL AZIZ
    • G06F9/44G06F9/22G06F13/00G06F15/16
    • H04L63/1441H04L63/1491
    • The present invention relates to a honeypot host (500) adapted in a network (90). The honeypot host (500) of the present invention is generally comprised of a computer system (10) and a honeypot system (300) incorporated in the computer system (10). The honeypot system (300) generally deploys at least one decoy host 80 to at least one unused Internet Protocol (IP) address (160) around the network (90). The honeypot system (300) is further adapted to be self-replicable. In the event that a honeypot system (300) in the network (90) is compromised, the honeypot system (300) is capable of self-terminating at least a portion of the compromised honeypot system (300) and self-replicating a new honeypot system (300). The honeypot system (300) is also further adapted to detect whether the current honeypot system (300) has been compromised. The present invention is also related in another aspect to a method for replicating a honeypot system (300) to replace a compromised honeypot system (300).
    • 本发明涉及适于网络(90)的蜜罐主机(500)。 本发明的蜜罐主机(500)通常包括计算机系统(10)和并入计算机系统(10)中的蜜罐系统(300)。 蜜罐系统(300)通常将至少一个诱饵主机80部署到围绕网络(90)的至少一个未使用的因特网协议(IP)地址(160)。 蜜罐系统(300)还适于自我复制。 在网络(90)中的蜜罐系统(300)被破坏的情况下,蜜罐系统(300)能够自我终止受损的蜜罐系统(300)的至少一部分并且自动复制新的蜜罐 系统(300)。 蜜罐系统(300)还适于检测当前蜜罐系统(300)是否已被破坏。 本发明还涉及一种用于复制蜜罐系统(300)以替代受损蜜罐系统(300)的方法的另一方面。