Font Size: a A A

A Preliminary Research On Virtual Honeynet

Posted on:2006-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:P CaiFull Text:PDF
GTID:2168360155972910Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of Internet, there are more and more application systems on the basis of the network, including e-commerce, E-government, electronic bank, online securities, shopping at network,etc., the information system of the network plays a greater and greater role in such aspects as politics , military , finance , commerce , traffic, the reliance on the information system of the network of modern society is strengthened day by day. The information of the network has already become the important problem which has concerned a national security , social stability safely. And the existing computer networks mostly neglect the safe problem at the beginning of construction, make the network seem very fragile and unsafe to face more and more serious threat, cause the further development of network application to be hindered . In the face of threatenning, numerous safe organizations and companies research and develop a lot of safe products, but the new attack method is appearing constantly, the update of the safe products can not catch up with the appearance of the question all the time, often after a certain attack has caused enormous losses , just take the remedy . And use a certain safe product such as Firewall , IDS , because of his one's own limitation alone, yet enough to protect modern 24+7+365 of network requires. So, join Honeypot technology after the Firewall and IDS , can already be used as studying the effective tool invaded, can as measure and is it frighten effective weapon of invador to hinder , make can only passive network safe practice of defence strengthen the initiative before, offend and defend and combine with , must protect the network in time and overall. This text set out from the initiative purpose to strengthen the safe practice, is reading about the Firewall and IDS document in a large amount, after going on in detail analyzing to weakness its , combine existing Honeypot research, through get to Honeypot system structure and key technology deepen discussion, test repeatedly, prove according to the experiment , combine the Firewall and IDS with Honeypot technology, can prewarning is it get various kinds of network attack to measure , utilize datum of Honeypot catch the function finely, can write down the invador's attack , the important initial data put to the proof as the technological analysis and administration of justice, can strengthen the defence and blow ability to the invador effectively , has improved the security of the network. The work of main research of the thesis includes: â‘ On the basis of further investigating key technology in traditional Honeynet , analyse its defect ; â‘¡To the defect of existing Honeynet system on the system structural design , utilize VMware technology, put up based on VMware Honeynet , solve traditional with high costs Honeynet , lay and maintain the complicated problem; â‘¢Accord with the concrete design demand for Honeynet system , design and put up a Self-Contained Honeynet. The thesis takes a development of fictitious Honeynet system as an example, focal point and difficult point of studying and expounding the fact the system while realizing in detail , to the question of traditional Honeynet , propose a kind of new-type dynamic self-reliant Honeynet model.
Keywords/Search Tags:Intrusion Deception, Virtual Honeypot, Passive fingerprinting, dynamic self-reliant
PDF Full Text Request
Related items