Font Size: a A A

Linkage Studies, Intrusion Detection And Honeypot

Posted on:2005-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:R DangFull Text:PDF
GTID:2208360122981647Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the Internet swift and furious development and the network socialization arrival, the Internet has opened her door to the commercial users and the ordinary public, the network communication and business volume experiencing a rolling snowball type growth. At the same time, as a result of the security flaws of the Internet itself, the increasing hacker' s network attacks and invasion behavior, the security of the Information highway raised the public alarm.At present, the solutions to network security problems varies. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. While these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. They cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality. Therefore purely depends upon these technologies cannot satisfy the complete safety needs. This article proposed a kind of structure framework which consists of both the honeypot and intrusion detection technologies. Through the use of many kinds of securities technology joint operation, to achieve enhanced network security goal.This technical framework acted according to each kind of security technology' s characteristic to carry on the classification of each security event. Proposely based on the XML' s unified format of the security event description, to designed the general exchange of information ports, making a number security products to be able to interact. In this linkage frame foundation, the system has realized the intrusion detection, and the honeypot joint operation and the intelligent linkage response technology, effectively enhance the system network security performance. This article ideas and the design already applied in the national 863 plans - the network coordination safety system.
Keywords/Search Tags:Network Security, Intrusion Detection, Honeypot, Interaction, XML
PDF Full Text Request
Related items