Font Size: a A A

Base On Anti-Honeypot Technology To Improvement And Design Of Honeyd

Posted on:2011-10-18Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2178360308461860Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Honeypot technology is an active defense technology, intrusion detection systems and networks with firewalls, etc., can enhance the safety performance of the network to make up for deficiencies in the existing security and defense, while also able to monitor and track the intruder's behavior, and through the log recorded in the form of analysis to analyze the understanding of intruder attack strategies, attack methods, in order to better defenders, targeted to improve their own protective measures.With the continuous efforts of researchers Honeypots, Honeypot technology is gradually mature and perfect, but any development is full of things is working with the anti-contest. As the Honey pot growing defense capabilities, giving the network the attacker has also come to a great constraints, so that more of the attackers began to study how to identify Honeypots in order to identify the presence of Honeypot, the better to bypass the Honeypot, attack Honeypot, which is anti-Honeypot technology. Anti-Honeypot technology research, it will promote the defenders of the anti-anti-Honeypot technology research. This paper argues that anti-anti-Honeypot technology is Honeypot technology in the anti-Honeypot technology, inspired by the further growth, this is a game of chess,This is also a recognition from the Honeypot technologies, through an identification and further stimulate research Honeypot Honeypot technology.Honeyd is an excellent honeypot software tools. The article from the attacker's point of view, using anti-honeypot technology to the improvement of Honeyd, expand and improve in order to achieve the purpose of Honeyd performance. Based on in-depth study of TCP / IP protocol and IP fragmentation of Honeyd identification based on the framework of the prototype application of TCP / IP protocol and IP packet fragmentation identify the behavioral characteristics of a successful experiment against Honeyd test. Establish an anti-honeypot framework aims to work in the future to create a network security tool for detecting honeypots, to detect the actual deployment of the loopholes in the honey pot, and for vulnerabilities to improve, further enhance the protective effect of Honeyd.
Keywords/Search Tags:Honeypots, Honeyd, Honeyd Identification, TCP/IP, IP Fragmentation
PDF Full Text Request
Related items