Font Size: a A A

Based On Linux Honeypot Technology

Posted on:2007-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:J M WeiFull Text:PDF
GTID:2208360185473823Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Through analysis of present network security development situation,this thesis proposes research necessity based on honeypot system of the active defense thought .The key of honeypot is how to realize a cheating network, which can strictly be controlled. Its goal is to isolate the intruder from the real product network to this traps environment, and to reduce threat that the real product network receives from the invasion as far as possible. At the same time,it may be used to attacking behavior, and methods of intruder,to collect invasion information, and observe its invasion. In order to analyze intruder's goal, attack tools, strengthen following network security strategy, and provide possible carries on the legal sanction to the intruder .Moreover, the choice of the operating system is also an important consideration factor to the honeypot system realization. Because the LINUX is a system of higher security and opening source code, it has the quite remarkable merit regarding to the honeypot system realization. The paper has constructed simply the honeypot system which realizes in the campusnet. Through description of the data control, data record,etc,it explaines the honeypot system will be able to be more and more advanced in network security application.Also,its status will become more and more prominent regarding to the entire network security system,.
Keywords/Search Tags:honeypot, honeynet, data-control, data-capture, logging
PDF Full Text Request
Related items