Font Size: a A A

Based On The Proactive Security Strategy Honeypot System Design And Implementation

Posted on:2009-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y W NiFull Text:PDF
GTID:2208360248952313Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the information technology unceasing development, the network security is valued people's day by day. The traditional network security technology like firewall, the invasion examination, the loophole scan, the viral protection, the data encryption and the authentication technology and so on mostly all are carries on the attack to the network carry on the passive protection when the hacker to the system, is the passive security policy. Cannot in advance the attack behavior conduct the research to the hacker, prevents accidents before they occur. And uses the technology along with the attack behavior daily multiplication to complicate day by day, applies these technologies to carry on the network protection merely, often cannot achieve the very good effect.The honey pot technology appearance has solved these problems to a certain extent, it took one kind of initiative safe defense technology is introduced in the network security domain, its value lies in the hope to attack and the invasion, in order to obtain more hackers to invade the information. The honey pot basic thought is the careful arrangement trap network attracts the hacker to invade, adopts the driving way, with its unique characteristic attraction hacker, understood hacker's mentality, simultaneously carries on to hacker's each kind of attack behavior analyzes and found effectively copes with the method.In order to enable the honey pot to have the attraction to the intruder, must use each deception measure.This article does prime task and innovation as follows:1. Has studied the honey pot technology. To the honey pot concept, the development course, the security value, the classification, the characteristic and the trend of development have conducted the detailed research and the elaboration.2. Multianalysis honey pot system architecture and key technologies. The honey pot system main technology has the network deceit, the port heavy direction detection, the invasion reports to the police, data management and data capture and so on.3. Through to the honey pot system exploration and the research, proposed one kind of establishment initiative security policy honey pot system basic mentality, and proposed several kind of practical and feasible honey pot system induction technology.
Keywords/Search Tags:security of network, active security policy, active beguiling technology, honeypot
PDF Full Text Request
Related items