Font Size: a A A

Computer Forensics System Based On Honeypot

Posted on:2012-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:X J LiFull Text:PDF
GTID:2178330335453361Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computers and the widespread application of Internet technology, the Internet security issues are also increasingly prominent, the face of the growing problem of Internet security, Internet based on the traditional passive defense technology because of its lack of understanding of the attackers, along with data the shortcomings of the evidence gathering is difficult, leading to the endless stream of new attacks is unable to cope. Therefore, how can the Internet security defense system passive to active, successful attack unsuccessfully to capture unknown attacks and attackers'further study the purpose and the use of technology, Internet security has become a hot technology.Therefore, this article in defense of traditional Internet technology based on the analysis, the use of honeypot technology-based computer forensics system design. Honeypot by deliberately exposing their vulnerabilities and weaknesses to attract intruders, and intruders in the invasion process the information in the records, allowing for more in-depth study. Article in the final analysis of the traditional lack of confidentiality U disk, using the security function with log U disk design ideas.
Keywords/Search Tags:Computer forensics system, honeypot, security Udisk, decoy system
PDF Full Text Request
Related items