Nothing Special   »   [go: up one dir, main page]

CN114465795A - Method and system for interfering network scanner - Google Patents

Method and system for interfering network scanner Download PDF

Info

Publication number
CN114465795A
CN114465795A CN202210103519.7A CN202210103519A CN114465795A CN 114465795 A CN114465795 A CN 114465795A CN 202210103519 A CN202210103519 A CN 202210103519A CN 114465795 A CN114465795 A CN 114465795A
Authority
CN
China
Prior art keywords
data packet
packet
access data
network scanner
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210103519.7A
Other languages
Chinese (zh)
Other versions
CN114465795B (en
Inventor
王嘉雄
周涛涛
魏兴国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Moan Technology Co ltd
Original Assignee
Hangzhou Moan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Moan Technology Co ltd filed Critical Hangzhou Moan Technology Co ltd
Priority to CN202210103519.7A priority Critical patent/CN114465795B/en
Publication of CN114465795A publication Critical patent/CN114465795A/en
Application granted granted Critical
Publication of CN114465795B publication Critical patent/CN114465795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a method and a system for interfering a network scanner, which relate to the technical field of network attack and defense, and the method for interfering the network scanner comprises the following steps: response data packets of a plurality of operating systems are prepared and stored, all visitors are sniffed, and the access data packets are received. And if the access data packet is in normal flow access, responding to the response data packet of SYN/ACK returned by the access data packet, and establishing communication connection with the visitor after three-way handshake is completed. And if the access data packet is a scanning packet, sending a response data packet of any operating system except the local computer back to the network scanner. The method has the advantages that when the network scanner accesses, the specific response data packet is automatically responded according to the response mode of the specified operating system, the algorithm of the network scanner is fixed and unchangeable, and the specific fingerprint can be generated for the specific response data packet, so that the network scanner of an attacker can misjudge that the operating system is the specified operating system.

Description

Method and system for interfering network scanner
Technical Field
The present application relates to the field of network attack and defense technologies, and more particularly, to a method and system for interfering with a network scanner.
Background
In the field of network attack and defense, the first step of all attack/security tests is usually to collect information through network scanning, and an important ring in network scanning is to identify an operating system corresponding to a certain IP. After identifying the operating system, an attacker/security tester can only attack through the vulnerabilities that the operating system has. Therefore, if one operating system is directly forged into another operating system in the detection link of the scanner, a certain degree of defense can be performed. The identification function of the existing scanner operating system is the open source tool nmap which is used in the market in the widest application range, most of other network scanning tools are developed and completed based on the nmap scanner, and the fingerprint identification function of the operating system is even the function of directly multiplexing nmap.
nmap is a network connection end scanning software for scanning the open network connection end of the online computer. Determine which services are running on which connections and infer which operating system the computer is running for assessing network system security. Just as most of the tools used for network security, nmap is also a popular tool for hackers and hackers. The system administrator may use nmap to probe for unauthorized use of servers in the work environment, but hackers may use nmap to gather network settings of the target computer and thereby plan a method of attack. The current technical solution of countermeasure scanning has the following drawbacks: the method can only select to turn off or turn on certain flow characteristics, and the defect of the scheme is uncontrollable fake result, namely the scanning result of the operating system can be fake and different from the original operating system, but the fake operation cannot be directed to the specified operating system type.
Disclosure of Invention
The present application aims to provide a method and a system for interfering a network scanner, so as to solve the technical problem in the prior art that the network scanner cannot directionally forge a specified operating system type.
In order to achieve the technical purpose, the technical scheme adopted by the application is as follows:
a method of jamming a network scanner comprising the steps of:
preparing and storing response data packets of a plurality of operating systems, sniffing all visitors, receiving access data packets of the visitors, detecting the access data packets and judging the types of the access data packets;
if the access data packet is in normal flow access, responding to a response data packet of SYN/ACK returned by the access data packet, and establishing communication connection with the visitor after three-way handshake is completed;
and if the access data packet is a scanning packet, sending a response data packet of any operating system except the local computer back to the network scanner.
Preferably, the method further comprises the steps of:
setting at least two different types of operating systems, and setting a flow forwarding interface, wherein the flow forwarding interface is used for receiving an access data packet of the visitor, detecting the access data packet and judging the type of the access data packet;
one of the operating systems is used for running the service and calling the flow forwarding interface in the local computer, and the other operating systems are used for preparing and storing the response data packet of the operating system.
Preferably, preparing and storing response data packets of a plurality of operating systems, specifically comprising the following steps:
and simulating to receive a system detection probe sent by the network scanner, modifying the data content of the IP packet header and the TCP packet header in response to the system detection probe, and generating and storing a response data packet of the specified operating system.
Preferably, sniffing all visitors and receiving an access data packet of the visitors, detecting the access data packet and determining the type of the access data packet specifically includes the following steps:
setting a raw _ socket interface, and monitoring access data packets of all visitors through the raw _ socket interface;
disassembling the structure of the access data packet, analyzing each element in the structure after disassembly, detecting the access data packet according to the element and judging the type of the access data packet;
the access data packet comprises an IP packet and a TCP packet.
Preferably, the method further comprises the steps of:
blocking a local operating system from sending a Reset packet by an IP information packet filtering system;
and blocking the local operating system by the IP information packet filtering system to reply the ICMP packet.
Preferably, the system probing probes comprise a sequence generation algorithm probe, a TCP protocol probe, a UDP protocol probe, an ICMP echo probe, and an ECN probe.
Preferably, the data content of the IP packet header and the TCP packet header includes a sequence generation algorithm of a TCP/IP protocol stack, a greatest common divisor of a TCP ISN, a growth rate and SP, a TCP timestamp selection algorithm, a TCP initial window size, a TCP explicit congestion handling mechanism, a UDP reserved header bit, flag bit information, and an IP packet attribute.
A system for jamming a network scanner, comprising:
the storage unit stores response data packets of a plurality of operating systems;
the judging unit is used for sniffing all visitors, receiving access data packets of the visitors, detecting the access data packets and judging the types of the access data packets;
the first communication unit is used for responding to a response data packet of SYN/ACK returned by the access data packet and establishing communication connection with the visitor after three-way handshake is completed;
and the second communication unit is used for sending a response data packet of any operating system except the local operating system back to the network scanner.
An electronic device comprising a memory and a processor, the memory for storing one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement a method of jamming a network scanner as described above.
A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the method described above.
The application provides beneficial effect lies in:
1. the method comprises the steps of preparing and storing response data packets of a plurality of operating systems, detecting the access data packets, judging the types of the access data packets, and sending the response data packets of any operating system except a local machine back to a network scanner if the access data packets are scanning packets. When the network scanner accesses, the network scanner automatically responds to the specific response data packet according to the response mode of the specified operating system, the algorithm of the network scanner is fixed and invariable, and the specific response data packet generates specific fingerprints, so that the network scanner of an attacker misjudges the operating system as the specified operating system.
2. According to the method and the device, the IP information packet filtering system is used for blocking the local operating system from sending the Reset packet, the influence on the three-way handshake process of the flow forwarding interface and the visitor is avoided, and the IP information packet filtering system is used for blocking the local operating system from replying the ICMP packet, so that the detection result of the network scanner is interfered.
3. The method simulates and receives the system detection probe sent by the network scanner, responds to the system detection probe to modify the data content of the IP packet header and the TCP packet header, generates and stores a response data packet of a specified operating system, all data used for generating the fingerprint by the network scanner are from the IP packet header and the TCP packet header, and the effect of deceiving the identification function of the operating system of the network scanner can be achieved as long as the data content of the IP packet header and the TCP packet header is modified.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a method of disturbing a network scanner in embodiment 1.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example 1:
as shown in fig. 1, the present embodiment includes a method for jamming a network scanner, comprising the steps of: preparing and storing response data packets of a plurality of operating systems, sniffing all visitors, receiving access data packets of the visitors, detecting the access data packets and judging the types of the access data packets.
And if the access data packet is in normal flow access, responding to the response data packet of SYN/ACK returned by the access data packet, and establishing communication connection with the visitor after three-way handshake is completed. And if the access data packet is a scanning packet, sending a response data packet of any operating system except the local computer back to the network scanner.
Specifically, in normal network services, an attacker and a normal visitor both directly access a service port, and a network scanner of the attacker can directly judge specific information of the current operating system to form a fingerprint by detecting information of a tcp/ip protocol, and can judge the type of the current operating system by comparing the fingerprint with a database.
When the network scanner accesses, the network scanner automatically responds to the specific response data packet according to the response mode of the specified operating system, the algorithm of the network scanner is fixed and invariable, and the specific response data packet generates specific fingerprints, so that the network scanner of an attacker misjudges the operating system as the specified operating system.
Further comprising the steps of: setting at least two different types of operating systems, and setting a flow forwarding interface, wherein the flow forwarding interface is used for receiving an access data packet of an accessor, detecting the access data packet and judging the type of the access data packet. One of the operating systems is used for running the service and calling the flow forwarding interface in the local computer, and the other operating systems are used for preparing and storing the response data packet of the operating system.
In this embodiment, two operating systems, namely a first operating system and a second operating system, are prepared, and a traffic forwarding interface is defined as a traffic forwarding program of a mapper. The first operating system is used for operating the service and the mapper, the second operating system is used for preparing and storing a response data packet corresponding to the operating system, when the network scanner scans the first operating system, the fingerprint of the second operating system is detected, and the first operating system is judged as the second operating system.
Preparing and storing response data packets of a plurality of operating systems, and specifically comprising the following steps: and simulating to receive a system detection probe sent by the network scanner, responding to the data content of the system detection probe modification IP packet header and TCP packet header, generating a response data packet of the specified operating system and storing the response data packet.
The system detection probe comprises a sequence generation algorithm probe, a TCP protocol probe, a UDP protocol probe, an ICMP echo probe and an ECN probe.
Sniffing all visitors and receiving the visit data packets of the visitors, detecting the visit data packets and judging the types of the visit data packets, specifically comprising the following steps: and setting a raw _ socket interface, and monitoring access data packets of all visitors through the raw _ socket interface.
And disassembling the structure of the access data packet, analyzing each element in the structure after disassembly, detecting the access data packet according to the elements and judging the type of the access data packet. The access data packet comprises an IP packet and a TCP packet.
In this embodiment, the original service port is bound to other local ports, and the mapper traffic forwarding program is started at the same time, where the original service port is defined as the first service port, and the other ports are defined as the second service ports. Since the mapper does not listen to any port, a raw _ socket interface is set, and the raw _ socket interface is used for sniffing access data packets of all visitors. The flow forwarding interface is used for receiving the access data packet of the visitor, detecting the access data packet and judging the type of the access data packet.
When the mapper snoops that a visitor tries to access the first service port through the raw _ socket interface, it is specifically determined that an access data packet is received, the destination port of the access data packet is the first service port, and the TCP flag bit is SYN, that is, the mapper receives a SYN data packet for the first service port. And disassembling the access data packet according to the structure of the IP packet and the structure of the TCP packet, analyzing each element in the structure after disassembly, and judging the type of the access data packet.
If the access is normal, in the subsequent communication process, taking out the TCP packet data in the access data packet of the visitor, actively initiating connection to communicate with the second service port, sending the data to the second service port, sending the return data retrieved from the second service port to the visitor, and continuously repeating the process until the process is finished.
Further comprising the steps of: and blocking the local operating system from sending a Reset packet by the IP packet filtering system, and blocking the local operating system from replying an ICMP packet by the IP packet filtering system.
Specifically, when the operating system receives a SYN packet, the kernel essentially receives the SYN packet and forwards the SYN packet to the user mode program. When the kernel receives the SYN data packet, the kernel judges whether a port to be sent for monitoring the data packet exists locally or not, if not, a Reset packet is actively sent to the visitor, and therefore the visit of the visitor is interrupted.
The mapper runs in a user mode and does not monitor any port, and sniffs all SYN data packets through a raw _ socket interface, so that before the mapper sniffs the SYN data packets and sends SYN + ACK handshake packets according to the port, the kernel already sends Reset packets, which inevitably affects the three-way handshake process between the mapper and the visitor, and therefore the operating system needs to be prohibited from sending the Reset packets.
Specifically, the ICMP request is one of the ways for the visitor to determine whether the requested host is alive, and different operating systems respond to the request differently, which results in different fingerprints generated by the network scanner, so that the fastest solution is to not respond to the packet, which may interfere with the network scanner's detection result.
Specifically, the network scanner sends a plurality of specific data packets to the host to be scanned through the characteristics of the tcp/ip protocol stack, different operating systems have different responses to the specific data packets, the network scanner generates different fingerprints according to the different responses, and a fingerprint database is formed.
The data content of the IP packet header and the TCP packet header comprises a sequence generation algorithm of a TCP/IP protocol stack, a maximum common divisor of TCP ISN, an increase rate and SP, a TCP timestamp selection algorithm, a TCP initial window size, a TCP explicit congestion handling mechanism, a UDP reservation header bit, flag bit information and IP packet attributes.
Specifically, the network scanner uses 5 types of specially constructed system probe probes to perform operating system scanning on the specified host, where the 5 types of probes include a sequence generation algorithm probe, a TCP protocol probe, a UDP protocol probe, an ICMP echo probe, and an ECN probe. Further, the network scanner generates a calculation result through a plurality of algorithms according to a data packet returned in response, the calculation result forms a fingerprint, and the returned data packet includes an IP packet header and a TCP packet header.
All data used by the network scanner to generate the fingerprint is derived from the IP packet header and the TCP packet header, and more specifically, the fingerprint information includes a sequence generation algorithm of a TCP/IP protocol stack, a maximum common divisor, an increase rate and SP of a TCP ISN, a TCP timestamp selection algorithm, a TCP initial window size, a TCP explicit congestion handling mechanism, a UDP reserved header bit, and other more detailed flag bit information and IP packet attributes. The effect of deceiving the identification function of the operating system of the network scanner can be achieved only by modifying the data content of the IP packet header and the TCP packet header.
Example 2:
this embodiment includes a system for jamming a network scanner, comprising: and the storage unit stores response data packets of a plurality of operating systems. And the judging unit is used for sniffing all the visitors, receiving the access data packets of the visitors, detecting the access data packets and judging the types of the access data packets.
And the first communication unit is used for responding to a response data packet of the SYN/ACK returned by the access data packet and establishing communication connection with the visitor after three-way handshake is completed. And the second communication unit is used for sending a response data packet of any operating system except the local computer back to the network scanner.
The relevant points can be seen in the description of the embodiment 1.
Example 3:
an electronic device comprising a memory and a processor, the memory for storing one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement a method of jamming a network scanner as described above.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the electronic device described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the method of embodiment 1.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that:
reference in the specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the application. Thus, the appearances of the phrase "one embodiment" or "an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
In addition, it should be noted that the specific embodiments described in the present specification may be different in terms of the parts, the shapes of the components, the names of the components, and the like. All equivalent or simple changes in the structure, characteristics and principles as described in the patent idea are included in the protection scope of the patent. Various modifications, additions and substitutions for the specific embodiments described herein may occur to those skilled in the art without departing from the scope and spirit of the invention as defined by the accompanying claims.

Claims (10)

1. A method of jamming a network scanner, comprising the steps of:
preparing and storing response data packets of a plurality of operating systems, sniffing all visitors, receiving access data packets of the visitors, detecting the access data packets and judging the types of the access data packets;
if the access data packet is in normal flow access, responding to a response data packet of SYN/ACK returned by the access data packet, and establishing communication connection with the visitor after three-way handshake is completed;
and if the access data packet is a scanning packet, sending a response data packet of any operating system except the local computer back to the network scanner.
2. The method of claim 1, further comprising the step of:
setting at least two different types of operating systems, and setting a flow forwarding interface, wherein the flow forwarding interface is used for receiving an access data packet of the visitor, detecting the access data packet and judging the type of the access data packet;
one of the operating systems is used for running the service and calling the flow forwarding interface in the local computer, and the other operating systems are used for preparing and storing the response data packet of the operating system.
3. The method of claim 1, wherein preparing and storing response packets for a plurality of operating systems comprises the steps of:
and simulating to receive a system detection probe sent by the network scanner, modifying the data content of the IP packet header and the TCP packet header in response to the system detection probe, and generating and storing a response data packet of the specified operating system.
4. The method as claimed in claim 1, wherein sniffing all visitors and receiving access packets of said visitors, detecting said access packets and determining the type of said access packets, comprises the following steps:
setting a raw _ socket interface, and monitoring access data packets of all visitors through the raw _ socket interface;
disassembling the structure of the access data packet, analyzing each element in the structure after disassembly, detecting the access data packet according to the element and judging the type of the access data packet;
the access data packet comprises an IP packet and a TCP packet.
5. The method of claim 1, further comprising the step of:
blocking a local operating system from sending a Reset packet by an IP information packet filtering system;
and blocking the local operating system by the IP information packet filtering system to reply the ICMP packet.
6. A method of jamming a network scanner according to claim 3 wherein the system probing probes comprise sequence generation algorithm probes, TCP protocol probes, UDP protocol probes, ICMP echo probes and ECN probes.
7. A method of disturbing a network scanner as in claim 3, wherein said data content of said IP header and TCP header includes sequence generation algorithm of TCP/IP stack, maximum common divisor of TCP ISN, growth rate and SP, TCP timestamp selection algorithm, TCP initial window size, TCP explicit congestion handling mechanism, UDP reserved header bits, flag bit information and IP packet attributes.
8. A system for jamming a network scanner, comprising:
the storage unit stores response data packets of a plurality of operating systems;
the judging unit is used for sniffing all visitors, receiving access data packets of the visitors, detecting the access data packets and judging the types of the access data packets;
the first communication unit is used for responding to a response data packet of SYN/ACK returned by the access data packet and establishing communication connection with the visitor after three-way handshake is completed;
and the second communication unit is used for sending a response data packet of any operating system except the local operating system back to the network scanner.
9. An electronic device comprising a memory and a processor, the memory storing one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement a method of interfering with a network scanner as claimed in any one of claims 1 to 7.
10. A readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210103519.7A 2022-01-27 2022-01-27 Method and system for interfering network scanner Active CN114465795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210103519.7A CN114465795B (en) 2022-01-27 2022-01-27 Method and system for interfering network scanner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210103519.7A CN114465795B (en) 2022-01-27 2022-01-27 Method and system for interfering network scanner

Publications (2)

Publication Number Publication Date
CN114465795A true CN114465795A (en) 2022-05-10
CN114465795B CN114465795B (en) 2024-03-29

Family

ID=81411970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210103519.7A Active CN114465795B (en) 2022-01-27 2022-01-27 Method and system for interfering network scanner

Country Status (1)

Country Link
CN (1) CN114465795B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087196A (en) * 2006-12-27 2007-12-12 北京大学 Multi-layer honey network data transmission method and system
CN101567887A (en) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 Vulnerability simulation overload honeypot method
CN105721442A (en) * 2016-01-22 2016-06-29 耿童童 Spurious response system and method based on dynamic variation and network security system and method
KR20200055403A (en) * 2018-11-13 2020-05-21 한국전자통신연구원 Decoy apparatus and method for expand fake attack surface using deception network
CN112688900A (en) * 2019-10-18 2021-04-20 张长河 Local area network safety protection system and method for preventing ARP spoofing and network scanning
CN112751815A (en) * 2019-10-31 2021-05-04 华为技术有限公司 Message processing method, device, equipment and computer readable storage medium
CN113114666A (en) * 2021-04-09 2021-07-13 天津理工大学 Moving target defense method for scanning attack in SDN network
CN113132335A (en) * 2019-12-31 2021-07-16 西安跃亿智产信息科技有限公司 Virtual transformation system and method, network security system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087196A (en) * 2006-12-27 2007-12-12 北京大学 Multi-layer honey network data transmission method and system
CN101567887A (en) * 2008-12-25 2009-10-28 中国人民解放军总参谋部第五十四研究所 Vulnerability simulation overload honeypot method
CN105721442A (en) * 2016-01-22 2016-06-29 耿童童 Spurious response system and method based on dynamic variation and network security system and method
KR20200055403A (en) * 2018-11-13 2020-05-21 한국전자통신연구원 Decoy apparatus and method for expand fake attack surface using deception network
CN112688900A (en) * 2019-10-18 2021-04-20 张长河 Local area network safety protection system and method for preventing ARP spoofing and network scanning
CN112751815A (en) * 2019-10-31 2021-05-04 华为技术有限公司 Message processing method, device, equipment and computer readable storage medium
CN113132335A (en) * 2019-12-31 2021-07-16 西安跃亿智产信息科技有限公司 Virtual transformation system and method, network security system and method
CN113114666A (en) * 2021-04-09 2021-07-13 天津理工大学 Moving target defense method for scanning attack in SDN network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈家东;朱建军;: "操作系统探测防御方法研究", 电脑开发与应用, no. 02, pages 1 - 3 *

Also Published As

Publication number Publication date
CN114465795B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
US9451036B2 (en) Method and apparatus for fingerprinting systems and operating systems in a network
CN108521408B (en) Method and device for resisting network attack, computer equipment and storage medium
CN109981653B (en) A web vulnerability scanning method
KR20000054538A (en) System and method for intrusion detection in network and it's readable record medium by computer
CN113179280B (en) Deception defense method and device based on malicious code external connection behaviors and electronic equipment
CN112738095A (en) Method, device, system, storage medium and equipment for detecting illegal external connection
CN113810381A (en) A crawler detection method, web application cloud firewall, device and storage medium
CN109218294A (en) Anti-scanning method, device and server based on machine learning bayesian algorithm
EP3230886B1 (en) Operating system fingerprint detection
CN106713242B (en) Data request processing method and processing device
CN112217777A (en) Attack backtracking method and equipment
CN112422486B (en) SDK-based safety protection method and device
CN110381047B (en) Network attack surface tracking method, server and system
CN114338120A (en) Segment scanning attack detection method, device, medium and electronic equipment
CN110058565B (en) Industrial control PLC system fingerprint simulation method based on Linux operating system
CN113098852A (en) Log processing method and device
CN114465795B (en) Method and system for interfering network scanner
KR100772177B1 (en) Method and apparatus for generating intrusion detection event for security function test
JP3892322B2 (en) Unauthorized access route analysis system and unauthorized access route analysis method
CN102957581A (en) Network access detection system and network access detection method
CN108650274B (en) A kind of network intrusion detection method and system
CN117254931A (en) Port scanning method, device and scanning engine
JP3986871B2 (en) Anti-profiling device and anti-profiling program
CN114363087B (en) Scanner countermeasure method and system based on bypass interference
CN115604162A (en) A detection method for network security equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 1st Floor, Building 3, No. 2616, Yuhangtang Road, Cangqian Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Applicant after: HANGZHOU MOAN TECHNOLOGY CO.,LTD.

Address before: 311100 10th floor, Block E, building 1, 1378 Wenyi West Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant before: HANGZHOU MOAN TECHNOLOGY CO.,LTD.

GR01 Patent grant
GR01 Patent grant