Font Size: a A A

Research And Design On Network Security Defense System Based On Honeynet Technology

Posted on:2012-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y LuFull Text:PDF
GTID:2178330338993319Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the computer network technology developments, the network security becomes the most concerned issue. In nowadays, detecting the intrusion is becoming more and more difficult as the intrusion method of intruders changed with each passing day. Many organizations use firewall, IDS, virus defend system that are not enough to protect the network security. Its important to take action before intrusion happens to the protected network by warning technology. We can use the technology to hold the conversion between attacking and defensive mechanisms in information network, protect the rights and interests of our country in information space and also take prepare to the information war which shall happen in the future.Honeynet technology is valued by the network security, and be used in many areas. Honeynet could lure intruder's attack by using a seemly vulnerability so that we could study their attack motive, method and tools, especially that of new unknown attacks.Firstly, the basic concept, characteristic, core function, security value, application areas and security risk are on the paper. Then we introduce the architecture of honeynet, then analyse the changes of the architecture of honeynet in data capture and data control.Secondly, This paper proposes the design of a behavior based Intrusion Detection System (IDS), adopting Fuzzy hashing and Normalized Compression Distance (NCD) to determine similarity in behavioral profiles of worms and malware. It signifies the integration of Host-based Intrusion Detection System (HIDS) with already existing network based detection on Gen 3 Honeynet architecture.Based on deeply researching in honeynet, we design and implement a virtual honeynet system, include the framework and network topology, prove the security, usability, validity and reliability of the visual honeynet system by testing. Realizes the honeynet in the condition of the lab, it can do well by examination, these functions include data capture, data control, and data analyze are well.
Keywords/Search Tags:honeynet, proactive defense, Network security, honeynet system, data control, data capture, data analysis
PDF Full Text Request
Related items