Font Size: a A A

Network Security Research Based On The Technology Of Honeypot

Posted on:2007-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:R XiaoFull Text:PDF
GTID:2178360182492585Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet, a growing number of Web-based applications, modern society increasingly dependent on the network, and network security are also faced with enormous challenges. In the face of threats, many security agencies to develop a number of security products, but the attackers are constantly improving the level of technology, security products always keep upgrading the emergence of new issues, often resulting in a tremendous loss of attacks after remedial measures. The sole security technology, like the firewall or the intrusion detection technology, is insufficient to protect the network security. Thus, after joining in the firewall and IDs invasion into technology can be used to study the invaders effective tool, and can serve as a powerful weapon testing attackers make passive defense network security technology to enhance the initiative for network protection more timely and comprehensive.Honeypot technology is a new initiative based on the defense network security technology. The honeypot value is lured attackers attack the attackers and their techniques to obtain relevant information;it could also be used to attract the attention of the attackers and dispersed to protect the real network system. This article demonstrated some of the basic concepts of honeypot, the major key technologies, noting that the honeypot of distinctions, shortcomings. On this basis, this gives a virtual honeynet system design, including architecture design, functional modules and so on. From the author through existing security technology and, using virtual machine technology hypothesized system operating systems, network environment;Secondly, related to the firewall and IDs systems installed;Then, using packet capture mechanism to attack the data collection, analysis and recording.
Keywords/Search Tags:Honeypot, Honeynet, Network Security, Virtual Machine Technology
PDF Full Text Request
Related items