Font Size: a A A

Research And Implementation On Distributed Virtual Deception System

Posted on:2008-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:L F SunFull Text:PDF
GTID:2178360212474542Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Since 90s last century, the Internet technology developed rapidly. Internet has been widely used in various areas. However, due to the bugs on the security of the network, affairs, such as hackers'attack and intrusion, and the leakage of secured information, have posed a threat to the country, the economy and the society. To be worse, the affairs on Internet security shows in a rush increase trend. At the same time, the security technology has developed at an even faster speed.Intrusion Detection System (IDS) is one of these technologies. Nevertheless, during the employment of the IDS, there exist massive problems, especially on misinformation, failing to report and lack of real time corresponding, which affect the system taking good performance. Under this background, network deception is brought in and one implementation pattern is honeypot.In the paper, based on the research on dynamic defense system, a network intrusion deception model is presented, followed by the implementation of a virtual deception system: VDHoneypot. This system is distributed based on the virtual machine technique. With the employment of virtual machine technique, the system can save resource, and is easy to construct, optimize and recover after broken. Furthermore, the distributed structure makes the system clear in the function of each module and convenient in management. With the encryption mechanism used in the communication among modules, the security of the system is guaranteed. Furthermore, the Support Vector Machine is used in the system to monitor system situation. The implementation of the system is shown in detail in the paper, followed by the test on the system.At the end of the paper, the research work is summarized and the potential research topic is discussed.
Keywords/Search Tags:honeypot, honeynet, intrusion detection, virtual machine, network intrusion deception, Support Vector Machine
PDF Full Text Request
Related items