Font Size: a A A

Research And Implementation Of Virtual Routing On Network Intrusion Deception And Control

Posted on:2007-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:D X ZhangFull Text:PDF
GTID:2178360215475273Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network intrusion deception and control technology is a security technology, whichcan control the intrusion actively. It can hold down and transfer the attack of the intruders,analyze the method of intrusion, collect evidence of network intrusion and even run afterthe intruders. The technology of network intrusion deception and control increase the costof intrusion, makes the intruders afraid of being run after to expose their identities andattacking method, which can decrease their resource and time to be used to attack others,correspondingly increase the security of network. The paper combines with intrusiondetection, intrusion response, honeypot, honeynet and routing technologies, according tothe thinking and existing research fruit of intrusion deception and control technology andprovides a intrusion deception and control system model, which can increase the ability ofthe system of intrusion deception and control by combing these kind of network security,technologies. The model consist of intrusion detection sub-system, decision-makingsub-system, intrusion deception sub-system, intrusion response sub-system and behavioranalyze sub-system. I give emphasis to the intrusion deception sub-system and the virtualrouting according to the intrusion deception model-HoneyGate. The virtual routing ismostly applied in the network deception module and host deception module. The paperalso studies the design and implementation of address scans deception, route tracingdeception and virtual router. Finally I test the design and summarize the contribution ofthis paper, at the same time indicate the improvement in the future.
Keywords/Search Tags:Network security, Intrusion deception and control, deception environment, virtual routing
PDF Full Text Request
Related items