Font Size: a A A

Network Security-Research And Implementation Of Honeypot Technology

Posted on:2007-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:X Z LiangFull Text:PDF
GTID:2178360182479293Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the coming of the information times, computer network security defense mechanismis being changed from passivity to initiative, so honeypot technology is more and moreregarded as an effective way to anti-attack. Honeypot provides an effective way to deeply knowthe hackers, which can improve an organization's network security. This paper discusses the technology of honeypot and work mechanism and realizationmethods of the higher form of honeynet. At first, this paper introduces the present situation,problems and attack category and method of network security, then provides one kind of newnetwork security solution based on both honeypot technology. Second, this paper discusseshoneypot technology, including present research work of honeypot, existing honeypot systemand category of honeypot in detail, and explains work principle of honeynet, data capture anddata analysis. Finally, we give the model of production honeynet based on virtual machinetechnology, which is based on model of Gen I and Gen II honeynet and explain the workmechanism. In the system implementation section, we expatiates design and implementation of a kindof low interactive honeypot that only simulates network services under the Linux system. Thissystem is classified three function models, which are communication of network, managementof orders and records of logs, have achieved data control and data capture of honeypot on thecondition that host is safe. Honeynet is a complex net framework, Combined the actualrequirement and equipments those we have. We have achieved the product honeynet based onthe technology of virtual machine, which can work in the local network, and then discussedhow to install and configure honeynet system in detail. The results show that honeypot systemcan achieve the expectation and have high practical value.Finally, we discuss defects and the future development tendency of the honeypot system.
Keywords/Search Tags:Network Security, Honeypot, Honeynet, Intrusion Detection
PDF Full Text Request
Related items