Font Size: a A A

A Honeynet System Design Based On The Proactive Security Strategy,

Posted on:2006-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:M H XiongFull Text:PDF
GTID:2208360152482390Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization computer network, it has more and more important influence on most critical department of social political ,economic and military. But units which consist of the network, despite of they are hardware or software, switch device or terminal device , have much vulnerabilities and easily be attacked. So study how to protect the network is becoming pressing.Traditional network information security technologies include Firewall, Invasion Detection System, Access Control .These technologies are based on matching the rules ,which is an passive security policy , They cannot be effective if the attack is unknown or new. In Face of \the fast developing of attacking technologies, these security technologies often fall into morass.In order to solve this problem ,this paper deeply studies a new security technology named network entrapment or honeynet.,on the base of which designs and realizes a honeynet utilizes initiative security policy.This paper first studies crucial technologies that are utilized by honeynet ,and investigates some problems of the honeynet technology. Then designs a real honeynet system. Develops applications that are needed to create this honeynet. These applications include the honeypot system management tools, redirection tools , log-analyzing and auditing tools. Also these applications include an emergency-response tools which is used to deal with the attackers' animus activities. At last ,we use these applications and some hardware to realize our honeynet ,and give a test to it.The test result verifies that the honeynet is an effective way to capture attackers' information and have reached the intended targets.
Keywords/Search Tags:Network security, IDS(invasion detection system), initiative security policy, honeynet.
PDF Full Text Request
Related items