Font Size: a A A

Research Of Honeypot

Posted on:2006-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:X D WangFull Text:PDF
GTID:2168360155465846Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent years, have already obtained breakthrough development in some traditional information safe practices and relevant products, but generally lack the initiative of the defence of the network. Meanwhile, while socialize with the invador, the effective information safe practice more voluntarily of another kind has been entering people's vision gradually, that is technology of the honeyed pot.Honeypot technology are a fictitious system or the network. It is specially used for inveigling a hacker, find, keep and analyze the mark which the hacker leaves on the computer system, follow their whereabouts at any time, understand latest technology and working thinking that the hacker uses. Through obtaining these skills, we will understand the threat that we meet better, understand how prevent threat these , thus in obtain the heaviest initiative with the hacker's war.Honepot technology application of reality at present give play to their potential point that text discusses. This text has analysed popular one's own characteristics of honeypot software in the network at present, put forward one excavating honeypot designing of system of technology on the basis of IDS technology and datum new-type, have improved the actual using value of honeypot greatly.This text sets out from the essence of studying honeyed pot at first, after deep analysis domestic and international tradition and technology of the honeypot of front, have summarized technological difficult point and defect existing mainly of the technology of the honeypot . In line with the question of putting forward afterwards , solve the thinking of the problem , has proposed it to the technology expansion method of the existing honeypot --Combine the comprehensive solution of the safe practice of other information . Interdepend, on the mechanism of supplementing eachother , not only make the value of the honeypot get maximum embodiment and improve and strengthen other information supportability of United Technologies. On one hand this text proceeds from technology of IDS, start with from studying the development of IDS and technological principle, can realize to one a concrete one honeypot inveigle IDS model of function further investigate; Study Honeynet system and key technology deeply on the other hand, excavate technology of the data to introduce the honeyed pot system at the same time , have optimized and strengthened the function of IDS system. Excavate on the basis of IDS and data new-type honeypot system of technology effective enhancement honeypot inveigle the function not merely, big improvement honeypot system protection and analytical capacity to data of attacking to goal resources, and benefit of effective improvement IDS.
Keywords/Search Tags:IDS, honeypot, data mining
PDF Full Text Request
Related items