Font Size: a A A

Research On The Honeypot Technology In Security Protecting System

Posted on:2008-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q LianFull Text:PDF
GTID:2178360242971403Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
A honeypot as a kind of active security protecting technology is introduced to the area of the network security. Its value manifests that it is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets.This paper begins by discussing what a honeypot is and how it works, then evaluates different available honeypot products and compares them to each other. For implementing a honeypot, this paper conducts the in-depth study of the virtual honeypot framework. Based on the study of the theory of honeypot, I designed and deployed a Virtual honeypot system called HoneypotMe. The honeypot system constructed by myself is an integrated system which can implement many capabilities of deception and decoy, action controlling, intrusion detecting, passive fingerprint detecting and data analyzing etc. This system was not only implemented but also tested. The test was done in the lab environment, and the collected datas of the attacks were analyzed. The paper illustrated the course and analyzed the results. The results show the system has achieved its purpose.Finally, some ideas of perfecting the functionality of the honeypot system and doing the further research on honeypot were put forward.
Keywords/Search Tags:honeypot, virtual honeypot, honeypot system, intrusion detection system Firewall, Passive fingerprint detecting, data analysis
PDF Full Text Request
Related items