Font Size: a A A

Intelligent Honeynet Architecture And Its Key Technology And Realization

Posted on:2010-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:Q ChengFull Text:PDF
GTID:2208360275483160Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of information technology, Internet users increase. People who are in the use of the network will encounter a series of security threat, for example, sensitive information from being leaked, stolen bank card password, the machine was the Trojan plant. However, users typically only after loss of property has been aware of their hackers, when they want to trace the hackers, the hackers have gone away, although the traditional means of defence, such as firewall, content detection can prevent users from hackes against, but they can only against kown attacks and unkown attacks for nothing. So, the concept of honeynet emerged, it is based on active defense theory. Honeynet primarily lures the attackers by using a seemly vulnerable but well arranged and observed environment to tolerance invasions so that we can study their behavior informations especially that of new unkown attacks. According to the enemy intelligence obtained, security organizations can better know dangers that their systems are facing currently and know how to prevent the dangers occurring.At first, this thesis surveys the related work of honeynet, introduces the basic concepts of honeypot and honeynet and analyses the difference between them, introduces the first and two generation honeynet technology and coparies their advantages and disadvantages, analuses the existing honeynet system inadequacies. Then combined with the project needs the architecture of honeynet is designed, this paper researchs the key techonology of honeynet, such as connection control determines the honeynet to assume the risks and value, data capture determines data volume and data types, phishing attacks increases the honeynet traffic, attracts attackers and allows an attacker to creat value for the honeynet, if there are no people to visit honeynet, it is a pile of expensive rubbish. At last, this paper designes and realizes a honeynet based on the architecture proposed and some related key techniques and testes the honeynet function.
Keywords/Search Tags:active defense, system architecture, honeynet, phishing attacks
PDF Full Text Request
Related items