Font Size: a A A

Study And Application Of Honeypot

Posted on:2005-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y H TanFull Text:PDF
GTID:2168360122480298Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. One goal of this paper is to show the possibilities of honeypots and their use in an educational as well as productive environment. The disadvantages of honeypots are also given in this paper.This work evaluates different available honeypot products and compares them to each other. Then, the theoretic study of honeypots is made, including level of involvement, information collecting and protecting thirty parties to limit risks. In the end, this article presents a honeynet model-XidianTech Honeynet, introduces the structure, implementation and several key technologies of the honeynet.After all, a conclusion about the new technology of honeypots and a look into the future of honeypots will be dared.
Keywords/Search Tags:Network Security, Honeypot, Honeynet, IDS
PDF Full Text Request
Related items