Font Size: a A A

Research On School Network Security Based On Honeypot Technology

Posted on:2010-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:S Q LiFull Text:PDF
GTID:2178360272478911Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the computer technology developing especially network technology, school network especially in education institutions, as an integral part of the Internet, is developing fast. The further development of school network in middle education institutions definitely plays an important role in strengthening information and resource sharing, and improving the work efficiency. When users take advantage of the convenience of working online, these security problems of school network arises. Notably in recent years the security events of school network are happening one after another: Worms, DDoS and other new attack methods are emerging endlessly and becoming increasingly complex, which often result in system failure and data sabotage as well as other serious consequences. It heightens users' awareness of the importance of network security. Therefore, how to build a solid school network security system in those middle education institutions becomes a question that should be given priority and tackled immediately.The recent major network information security technologies include firewalls, IDS, etc. These technologies are based on matching the rules. As a passive security policy, they fail to react effectively to unknown attacks, especially in face of the mounting new attacks. Therefore, an initiative security policy is required to protect the school network.In light of the situation, this paper explores an initiative protection technology—Honeypot. The intention of deploying honeypot is to attract the attackers to attack it, and then the action data that the attackers left in honeypot system can be captured. Through the study of Honeypot, this paper endeavors to design a school network security system based on initiative protection, to realize its core technology, and to test its function. The test result and its analysis show that this security system can help detect the unknown attacks against school network and collect the attackers' information. This paper leaves the question open for further discussion.
Keywords/Search Tags:network safety, Honeypot, HoneyNet, data capture
PDF Full Text Request
Related items