Font Size: a A A

P~2DR Model Improvement Research And Its Application In The Police Network

Posted on:2009-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2178360248952062Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the computer network increasingly universal, the network has become people life with work the inside is indispensable a part. Current police the network information turns the progress quickly, the secret information of every kind of each kind through a flood of saving in police appropriation network. On police's network the safe technique in applied network attackstones to the network primarily is to adopt the passive and defensive means, these meanseses face the phantasmagoria the attack with the method the method seem to be the pallor has no the dint. How to make the defence system of the police network security transfer from static state to the trends, defend measure from change into voluntarily passively, security to ensure network, construct safe line of defence become network main task and new subject of research of security expert.This text according to the model of P~2DR is the representative's safe model in dynamic network to join together honeypot a strategy for and honeynets technique, passing safe technique in current network in integration, and then unifying as the core, can be dynamic, from orientation of regulate the safe strategy in network with the rule. Combine to apply the bottle of honeypot and honeynets net techniques in the model of P~2DR, improve the model of P~2DR Intrusion Detection System (IDS) function. Pass to experiment the verification, express an exaltation for and honeynets system effectively the model of P~2DR invade to examine the function, applying to join a the model of P~2DR for and honeynets technique after improving, becoming the passive protection before is active protection that blemish that now, to network on time modify, adopt the more tight protection measure to the black an object for wanting attackstoning, to modern public security official's network of the safety has to promote the function obviously.In the system implementation section, we expatiates design and implementation of a kind of low interactive honeypot that only simulates network services under the Linux system. This system is classified three function models, which are communication of network, management of orders and records of logs, have achieved data control and data capture of honeypot on the condition that host is safe. Honeynet is a complex net framework, Combined the actual requirement and equipments those we have. We have achieved the product honeynet based on the technology of virtual machine, which can work in the local network, and then discussed how to install and configure honeynet system in detail. The results show that honeypot system can achieve the expectation and have high practical value.Finally, we discuss defects and the future development tendency of the honeypot system.
Keywords/Search Tags:P~2DR model, honeypot, honeynets, Intrusion Detection System (IDS)
PDF Full Text Request
Related items