Font Size: a A A

The Research And Implementation Of Honeypot System

Posted on:2011-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ShangFull Text:PDF
GTID:2178360305960216Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the increasingly widespread application of computer networks, people's life and work are changing greatly. The computer brought great convenience for us, at the same time there are many problems in it. Vulnerabilities is used in some of the damage activities, thus, network security is more and more attention for people. Passive defense is used more in traditional network security technologies, such as firewall, intrusion detection. Since the traditional technology is lack of understanding of the intruder, can not respond to the changing and unknown attacks and other defects, therefore, turning passive defense to active defense, catching the intruder information and analyzing their behavior has become a hot current network security research.Honeypot is an active defense technology. It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system. According to the information gathered, we can analysis the latest technology which intruder used, discovery system security vulnerabilities, find out intruder attack tools, attack methods and attack motive, solve the problems in the system timely. For the entire network, a single honeypot system is not enough, but it can greatly increase network security by combination with intrusion detection system. In this paper, it establishes a honeypot system that combined the intrusion detection system, achieve an effective connection, propose a practical solution and carry out the design and implementation.Firstly, the paper studied the knowledge of honeypot, investigated the concept of honeypot, architecture, components, and its technical development phase. Focus on researching the content of network deception and key technologies, to necessary reserve knowledge for the follow-up design and implementation. Then after analyzing the demand of system, we raised its objectives and principles, and defined its technical framework and major functions. After that, analyses and designed the honeypot system and honeypot-IDS communication platform, the two major components of the functional modules. Then, we explored the system and described the specifically implementation method of the honeypot systems and communication platform. Finally, summarized this paper, and pointed out that honeypot system direction of further work.
Keywords/Search Tags:Network Security, Honeypot System, IDS, Data Capture
PDF Full Text Request
Related items