Font Size: a A A

Research On Honeypot For Embedded Network

Posted on:2011-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:S L YangFull Text:PDF
GTID:2178360308957226Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The application of the embedded system has filtered into industry, military affairs and some other daily life domains. With the generalization of the embedded system and the development of the embedded system, network and the Internet technology, the embedded network will become the trend of the application of the embedded system. With the existence of the embedded network, we must take attention to the security. Due to the limitation of the resources of the embedded system, it can't save and circulate large-scale security facilities. Except this, network security technologies are excessively passive defence, which knows little about attackers, not to mention that it can handle the endless unknown attacks.Honeypot is an active defense technology. It won't bring help to the network security directly, which just collects the information of the attackers and analyzes it. By doing this, then it do some researches to find the attacking methods and loopholes in the system, so it can also do much help to the network security. With the universality of the application of the embedded networks, the application of the honeypot technology in the embedded system environment is designed in this paper.This paper will firstly introduce the characteristic of the embedded network security and the honeypot technology and then take the embedded honeypot and embedded honeynet into thought. In several types of typical honeypot products, the paper chose virtual honeypot Honeyd as the research object in the embedded system environment.On the base of analysis of the critical technology and general frame of the Honeyd, transplant it into the embedded system, and then propose the extension scheme. At last, the honeypot is deployed and tested in the embedded network environment, and the result shows that embedded honeypot plays a protective effect on the embedded network security.
Keywords/Search Tags:Embedded system, Embedded Netword, Honeypot, Honeyd
PDF Full Text Request
Related items