Font Size: a A A

Network Attacks And Honeypot Technology Research

Posted on:2005-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:W ChenFull Text:PDF
GTID:2208360125963995Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the coming of the information era, the faster the technology of network and communication develops , the more vulnerability of the network and operating system exposures to people. The internet become the paradise and hothouse of hacker and cracker, all kinds of network criminals flood all corner of the Internet, all sorts of network security incident frequently appears on some newspapers and media. At the same time, Internet becomes the battlefield where many domestic and overseas hostile infiltrate and overthrow our nation. Different scale Network attacking and defending war break out quietly. The status of network security increasingly worsen, it take huge lose at possession and economy, also take huge panic to people , even threaten safety and stabilization of nation. The security of information is confronted with huge threat and challenge.Ancient Chinese militarist concluded that if you want to secure yourself against the enemy, you have to first know who your enemy is. This military doctrine readily applies to the world of network security. Just like the military, you have resources that you are trying to protect. The traditional information security solution such as firewall, Intrusion Detection System, security vulnerability scan, virtual private networking play the important role against hacker, but these solution gradually are laborsome in front of more and more network attack ,especially unknown attack. A honeypots is used in the area of computer and Internet security. It is a resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques. It can also be used to attract and divert an attacker from the real targets. One goal of this paper is to show the possibilities of honeypots and their use in an educational as well as productive environment. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as each trace is suspicious, because no productive components are running on the system. This fact enables the system to log every byte and to correlate this data with other sources to draw a picture of an attack and the attacker.First, this work discusses network attack, then evaluates different available taxonomy of computer and network attacks and compares them to each other. In a second part, theoretical aspects of a honeypots are developed, compared and rated. As a consequence, an implementation will be presented. In comparison to the few existing solutions, multiple improvements could be achieved. In future, the network attack modeling and response to network attack will be researched. After all, there are many things to do for the security of information, research of honeypots and network is a shortcut.
Keywords/Search Tags:honeypots, attack trap, network flow simulate, data capture, data control
PDF Full Text Request
Related items