No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - Network Management and Monitoring

S2720, S5700, and S6720 V200R013C00

This document describes the configurations of Network Management and Monitoring, including SNMP, RMON, RMON2, LLDP, Performance Management, iPCA, NQA, Service Diagnosis, Mirroring, Packet Capture, NetStream, sFlow, TWAMP Light, NETCONF, ECA, Intelligent Video O&M, eMDI, and Network Deception.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of Network Deception Technology

Overview of Network Deception Technology

After a hacker intrudes on the network shown in Figure 17-1, the hacker first scans IP addresses and service ports on the network to search for attack or spreading targets, and then uses the system or software vulnerabilities or brute force cracking measures to attack the target host. Network deception technology detects such scanning behavior on the network, and lures suspicious traffic to a Decoy for in-depth interaction and detection, protecting the service network from the hacker.

Figure 17-1  East-west scanning and attack behavior
Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100065680

Views: 58892

Downloads: 516

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next