Font Size: a A A

The Theory And Constrution Of Honeypot/Honeynet

Posted on:2003-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y J YouFull Text:PDF
GTID:2178360245978006Subject:Computer applications
Abstract/Summary:PDF Full Text Request
The rapid development of Information Technology,especially in Internet brings big fortune to people,and it highly improves the ability which human use to reconstruct and conquer world.The sword has two blades.With the positive function,it brings some negative facets simultaneously.The crisis which we have to face on the net is the Internet Security.Of the many kinds of menace to the Internet,the main way is remote attack.To the government,company and university,counter-hack is routine one.The administrators protect the network from different sides with many ways.For example,Intrusion Detection System,Firewall,Proxy and Secure Shell,are used to resist intrusion.However all these means base on the defence.The traditional defensive mode is too passive.Although they can reduce the secure risk to certain degree,they cann't monitor and react to the intrusive actions real time.The intrusion has very low cost and it can quit without any aftereffect.The situation cann't be changed unless administrators modify the tactics.This paper describes a unique solution of security:the technology of deception which includes Honeypot and Honeynet.Honeypot and Honeynet are important for leaming the tools,tactics and motives of blackhat community.According to the theory and technology of deception introduced by this paper,an example is set up.The example is analyzed from data capture,data analysis and others.It is a necessary part of an integrated secure solution of information.
Keywords/Search Tags:Honeypot/Honeynet, attack, data analyse
PDF Full Text Request
Related items