Font Size: a A A

Intrusion Prevention System

Posted on:2006-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:S Q DuFull Text:PDF
GTID:2168360152496638Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, more and more applications are realized through the network, at the same time the security of the network also faces the enormous challenge too. The fast network has facilitated intruders. The intruder's engineering skill is improving constantly too. How to protect systems and the believed networks from intrusion is an urgent problem to be solved at present. The traditional safe strategy now manifest their limitations, so a new system named Intrusion Prevention System has been come up. As a new active technology Intrusion Prevention System has two distinct advantages: first it can actively block the attacks before hacker started. On the other hand, intrusion prevention system can give a more effective response by tracing hacker and collecting detailed attacking information.Honeypot is a new technology developed in recent years. Honeypot can simulate real services or application so as to induce the hacker to attack it, thus it can collect all of the activities done by hack. We can learn the new methods and technologies by analyzing the information, thus we can discover what, where and how the threatens are existed. Honeypot offers abundant valuable information.Honeypot has a lot of drawbacks in security, so hacker will attack it, during this process honeypot will record all motives, methods and tools used by bad intruders. We can discover bugs and improve the network security performances to some extent by analyzing the information.During my work, I have generally studied the honeypot, I design a network security architecture by using honeypots. The campus network performance will be improved by deploying honeypots in different positions, the honeypots can collect a lot of valuable information. The more I comprehended about honeypot, especially in the capability of analyzing information, the more I learn about hacker' attack meantime...
Keywords/Search Tags:Honeypot, Honeynet, Deception System
PDF Full Text Request
Related items