Font Size: a A A

Design And Achievement On High-Interaction Honeynet System

Posted on:2011-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:J W XuFull Text:PDF
GTID:2178360308960934Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network, computer network has started playing the more important role in all aspects of people's lives. However, with the development, network security problems are exposed. More and more people pay attention to the computer network security. Traditional security tools such as firewalls and IDS, often in a passive defense, are hard to find new intrusion or attack. When the network and systems are compromised, invasion tools, the sources of the attacker, attack methods, targets are unknown.Honeynet technology is proposed in order to reverse this situation. Honeynet technology can monitor and analyze attacks, understand the attack tools and attack methods used by the attackers, and speculate the attacker's intentions and motives. The defenders will have a clear understanding of the security threats. The core requirements of the original honeynet are analyzed in this paper. For the shortage, a complex honeynet capture model and data analysis based on improved k-medoids algorithm is given. Based on the above improvement the high-interaction honeynet system is designed and implemented.Firstly, the paper explains the project's background and significance, and then confirms the problems to be settled. It analyzes honeynet techniques and high-interaction honeynet research status. Point out the advantages and disadvantages of high-interaction honeynet. A complex honeynet capture model and data analysis based on improved k-medoids algorithm is given for high-interaction honeynet key technology research. In the part of design and implementation in high-interaction honeynet system, this paper describes key technology implementations and every module's function. At last, summarize this paper and give forward-looking views.
Keywords/Search Tags:honeynet, data control, data capture, data analysis
PDF Full Text Request
Related items