Font Size: a A A

Hchs Honeypot System

Posted on:2008-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z JiangFull Text:PDF
GTID:2208360215966882Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The technology of honeypot and honeynet has offered the foundation for capturing and analyzing in depth hacker's behavior. But honeypot and honeynet are easy to be find by hacker at present, the validity of collecting evidence is similarly disputed. They are generally used to be researchful tool, The application of reality hazard the net.This research has summarized and analyzed the fruit of the application and the investigation. Aim at the problem that fraudulence is not enough and the security is disqualification now, a strategy of designing net for improving fraudulence and the security is put forward.the model of high concealable and high secure system of honeypot has been set up.The high concealable and high secure system of honeypot adopt any optimized measure:(1) Seamless switch environment technique is imported, it improved the concealable and decreased the finded possibility.(2) Mixing by misuse detect and abnormity detect enhanced the whole performance of honeynet system.This system adopt the mixed detect by misuse detect and abnormity detect. Therefore, the whole performance of the system is enhanced.In the simulated situation, link-out control test and ID test are done. The simulation results indicate that the security performance of the system is observably improved, Also, the finded possibility is unconspicuous. It effectively protect information systems, at the same time, it can collect assault info.
Keywords/Search Tags:HCHS system of honeypot, Seamless switch environment, Mixed detection, The whole performance
PDF Full Text Request
Related items