Font Size: a A A

Design And Realization Of Exceptionally Examines Based On Honey Pot System

Posted on:2009-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:P LiFull Text:PDF
GTID:2178360272974321Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Along with the Internet development, are more and more many based on the network application system, the modern society the dependence strengthens day by day to the network, the network security also is facing the huge challenge. Facing the threat, the multitudinous security organization has researched and developed many securities products, but aggressor's technical level also unceasingly is enhancing, the security product renewal throughout cannot follow the new question the appearance, often has created the heavy loss after some attack, only then takes the remedial treatment. Therefore only through in to the network security defense system and each kind of network security technology and in the tool research foundation, formulates the concrete system security policy, through the establishment multichannel security defense line, integrates each kind of reliable safety mechanism, establishes the perfect multilayered safe defense system, can resist from the system in, the outside invasion attack, achieves the maintenance network system the security.How does this article revolve to let the honey pot system both have the research value and to have protects in the local area network the computer function to launch the discussion. First exceptionally examined the technology to the traditional security technology and the network to carry on the outline, pointed out conducted the network security research the importance, to the honey pot technology basic concept, the classification, the characteristic has carried on the system elaboration, Next does not have the safekeeping of security function in view of the honey pot system the question, proposed one kind real-time reports to the police the honey pot system system overhead construction, this system structure introduced the network exceptionally to examine the mechanism, enabled the honey pot system to be able in the real-time examination network the latent invasion danger and carries on real-time reports to the police, had achieved let the honey pot both have the research value and to have real-time reports to the police the safekeeping of security goal, the invasion examination technology has realized the honey pot system data management, the data capture. This article finally has made the summary to the honey pot system characteristic, had to consummate the content to the next step of institute which and to develop to put forward the proposal.
Keywords/Search Tags:Honey Pot, Exceptionally Examines, Honeyd, Intruder
PDF Full Text Request
Related items