Font Size: a A A

Design And Implementation Of Virtual Environment Of Intrusion Deception System

Posted on:2008-09-11Degree:MasterType:Thesis
Country:ChinaCandidate:B HuFull Text:PDF
GTID:2178360215997659Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of Internet, a growing number of Web-based applications, modern society increasingly dependent on the network, and network security are also faced with enormous challenges. In the face of threats, many security agencies to develop a number of security products, but the attackers are constantly improving the level of technology, security products always keep upgrading the emergence of new issues, often resulting in a tremendous loss of attacks after remedial measures. The sole security technology, like the firewall or the intrusion detection technology, is insufficient to protect the network security. Good multi system security strategy based on the research of all kinds of network security technologies and defense system can avoid being attacked from the inside and outside attackers.The paper proposes intrusion deception system based on intrusion deception technology. The design idea of intrusion deception system is that the intrusion deception virtual environment is core. Doubtful behavior redirected to the strictly controlled deception environment can be supervised, audited, and analyzed. All audited information is sent to the intrusion detection system to improve the ability of intrusion detection.Intrusion deception virtual environment is emphasized on its design and implement. Virtual environment mimics the real environment, which can protect the real environment from the attackers'probe and attack. The designed virtual environment can provide FTP and Telnet virtual network service, virtual file system, system protection function, log record transmission service. After experimentation, the virtual environment has good effect on attacker and at the same time it can record the behavior of the attacker.
Keywords/Search Tags:Intrusion deception, Virtual environment, Virtual service, Virtual file system
PDF Full Text Request
Related items