摘要 |
<p><P>PROBLEM TO BE SOLVED: To connect a decoy host, for which illicit intrusion or illicit software investigation is purposely made possible, with an outside network, make the decoy host possible to be controlled by the host of an illicit intruder through the outside network, and make the communication from the decoy host not reach an optional host, when an aggressive communication is transmitted toward the optional host through the outside network by this control, and pretend the aggressive communication from the decoy host as if normally reach the host, and make the host continue the control to the decoy host. <P>SOLUTION: A communication switching device is arranged between the decoy host and the outside network, a spoofing response device is connected with the communication switching device. The communication switching device performs aggression detection treatment to communication transmitted from the decoy host toward the outside net work, and when not detecting aggression in the communication, sends packet to both of the spoofing response device and the outside network. After detecting aggression, the communication switching device sends packet only to the spoofing response device, and the spoofing response device sends reply to the decoy host pretending continuation of communication. <P>COPYRIGHT: (C)2009,JPO&INPIT</p> |