Font Size: a A A

Research Of Military Information Network Security Based On Honeynet

Posted on:2007-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:X S GuoFull Text:PDF
GTID:2178360212458419Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of network technology and the application of Internet, the information system of the network plays a greater and greater role in such aspects as politics, military, finance, commerce, traffic, the reliance on the information system of the network of modern society is strengthened day by day. The information of the network has already become the important problem which has concerned a national security, social stability safely. And the existing computer networks mostly neglect the safe problem at the beginning of construction, make the network seem very fragile and unsafe to face more and more serious threat, cause the further development of network application to be hindered. With the progress of the computer technique, various attack techniques targeted at information system emerges endlessly. Revolution in military affairs makes the dependency of campaign resources upon military information system increase gradually. How to assure information security is the current hot point of researching. In fact, information security is more than a technique problem, much more, it's a strategy problem. We must have good top-level design, unified infrastructure of the information security and increased research of the information security technique, which provides evidence for the construction of application information system and achieves synchronized development of information security and military informatization.A newly emerging network security technology based on active defense--honeypot technology is now widely concerned and will have a bright future. A honeypot is a network security resource, which can facilitate us to analyze and study the technology, tools and the motive of the intruders by monitoring their activities, and thus enhance our ability to safeguard the network. Honeynet is a high implementation of honeypot technology. As a network system, honeynet generally consists of firewall, intrusion detection system (IDS), one or more honeypot machines. This paper first studies crucial technologies that are utilized by honeynet, and investigates some problems of the honeynet technology. Then to each technology in the honeynet, for instance, data capture and data analysis, carry on detailed research and realize.
Keywords/Search Tags:information security, computer network, Honeypot, Honeynet
PDF Full Text Request
Related items