Inspur Honey Pot System (IHPS)

Inspur Honey Pot System (IHPS) is a security service based on deception and camouflage technology, which helps you quickly build more stable and secure applications by deploying traps on the critical path of attacker intrusion, detecting network attacks launched by attackers in the network, setting false targets, trapping attackers and attacking.

  • Product Advantages
  • Product functions
  • Application scenarios
  • solution

Product Advantages

  • East-west traffic threat awareness

    Listen on malicious behaviors in east-west traffic to help tenants quickly locate threat sources such as compromised hosts.

  • 安全稳定.png
    Dynamically display intranet risks

    The custom port is consistent with the service system and dynamically displays changes in security risks.

  • Full-port scanning and identification

    Support full-port scanning and identification of probes, comprehensively collect attack behaviors, and avoid false negatives.

Product functions

  • Simulation of common services

    Simulation of services for commonly used protocols can cover most of the external ports required by service systems.

  • Brute-force hack identification

    For remote management protocols and services, you can professionally identify their login behaviors and set alarm thresholds.

  • Judgment of the compromised host

    When a large number of horizontal scans targeting high-risk ports are detected, the attack source is determined to be a compromised host.

  • Alarm email notification

    After an attack event or a compromised host is discovered, an email is sent to the corresponding asset security officer for alarming.

  • Whitelist policy circumvention

    You can set whitelist IP and whitelist ports for special services.

  • Customize port settings

    You can customize the port settings for open simulated services, and you can set the corresponding ports according to business conditions.

Application scenarios

  • Security and compliance

  • Cybersecurity of major events/offensive and defensive drills

  • Classified Protection 2.0 requires that the boundary design of cloud security zones be able to identify and monitor network traffic between virtual machines. IHPS relies on probes deployed in VPCs to detect intranet attack threats in real time.

  • IHPS can be used as the last line of defense in the virtual network. Through the identification of attacks and timely alarm notifications, it can quickly find the compromised hosts in the network, so as to take emergency measures, and query relevant logs through the located IP, analyze the attack methods, and form a traceability analysis report.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.