Font Size: a A A

Research On Intrusion Penetration And Defense Based On Social Engineering

Posted on:2016-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:C XueFull Text:PDF
GTID:2208330479455444Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the scale of Internet users continues to expand, network security incidents occur frequently.According to some statistics, with the rise of Internet financial services and electronic commerce, phishing attacks gradually increase. The amount of Trojan viruses and botnets shows rapid growth trend.User information and sensitive data has become the focus of the hackers. Today,people who use the Internet is no longer confined to the computer industry. The non-computer professionals lack cybersecurity awareness and the master of the computer technology is low. They tend to become the target of attack. On the other hand, network security products constantly enrich and improve.The cost of penetration wil greatly increase if the attacker just uses the technology means. Under the influence of these factors, the network security issues dominated by social engineering increasely prominent. More hackers use social engineering to hacker attacks. It puts forward a new challenge to network security.This paper researchs on the invasion of penetration based on social engineering from two aspects of attack and defense. First, this paper researchs on the process of traditional penetratiom, social engineering basic model and Kasparov strategic model.Combine all three and put foword a new aggression model of invasion of penetration based on social engineering. After that, attack example is put into the aggression model and shows the effectiveness of such attacks by analyzing the process.At the end of the paper, Aiming at the shortcomings of the existing defense work,apply a honeypot to defense and put forword a social engineering defense model based on honeypot. The defense model combines the traditional network security resources and technology of the honeypot. The firewall and IDS defense the known attacks, the honeypot system defenses the unknown attacks and carries the attacking data flow to cover the real hosts. So that it can be in the effective use of existing resources, defense against the social engineering attacks.
Keywords/Search Tags:social engineering, invasion of penetration, honeypot, intrusion prevention
PDF Full Text Request
Related items