Font Size: a A A

The Research And Application Of Honeypot System In Ipv6

Posted on:2010-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhangFull Text:PDF
GTID:2198330332998595Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the vigorous development of Internet, all kinds of intrusions and intrusion practices are emerging, and triggering a series of security problems. Intrusion detection systems as a proactive, real-time dynamic network security prevention technologies, more and more are focused on.it determines whether a violation of security policy behavior and signs of attack by collecting, analyzing a number of key points of the data in computer network or system,and help the system deal with network attacks, expand the system administrator's security management capabilities, improve information security infrastructure integrity, thereby it can provide internal and external attacks and misuse in real-time protection.In this paper, based grasping IPv6 network the offensive and defensive strategies and the basic principles of honeypot systems, the system model Based on the relative credibility of honeypot technology, network intrusion detection in IPv6 is researched and designed, the main purpose is to deploy the Internet environment and capture and study the activities of hackers, for building next "security and trust" generation Internet architecture to provide the basisIn this paper, an IPv6 environment based honeypot Intrusion Detection System is researched and realized. IPv6 test bed are implementated by the China Education and Research Network of the Next Generation Internet CERNET2 (supported dual-stack),the host system is Windows Server 2003, using sniffer honeyoot, and based on this capture data of intrusion by scanning vulnerability,deny of service and analysis IPv6 packet.
Keywords/Search Tags:IPv6, honeypot, Intrusion Detection System, scan
PDF Full Text Request
Related items