Font Size: a A A

Based On The Active Defense Of The Honeynet System And Realization

Posted on:2011-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:B LvFull Text:PDF
GTID:2208360308475712Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid popularization and application of the internet, network security problems have become increasingly prominent , the methods and means of net invasion have become more and more diversified,the survival information platform has become fragile increasingly ,and both the traditional static defence and passive defence have difficult to meet the current network security needs.The active defence of the security system which based on honey net technology has become the focus of network security technology research, honey net is derived from the honey pot ,which is a kind of network security technology that research the purpose, strategies, tools and methods of network invader, under the premise of not to be found by the attacker as much as possible , the task of honey net is to capture the attacker's actions in the honey network and ensure that the honey pot in honey net system is not used as a springboard to attack the non-honey net system at the same time, finally ,analyze the data and find out new attack methods ,then predict the future attacks.In this thesis, associated with the network and network security knowledge, we research the honey pot and honey nets systematicly, analyze different kinds of the system functions and indicators of the honey net system, and the key technologies of honey net,summarize the characteristics of the new technology about honey net , and to emphasize the honey net architecture, information collection, risk management, data analysis, etc . At the same time, a virtual honey net system Win32 platform , which uses virtual machine technology installed various components of honey net on the host was designed and implemented. Finally, we test the virtual honey net .Using the unique function of honey net technology, some potential threats can be found in the system, the network's own insecurity factors offer great prospect developments for honey pot and honey network technology . The programs of honey net technology can be used by government, military, businesses, institutions, organizations and individuals to research network invasion and improve the ability to resist invasion, protect their network resources, and even can make the appropriate counter. But Honey networks and honey pot still has a certain degree of risks in practice., the application of honey net and honey pot still face uncertainable risks , however, if a certain goal and necessary conditions about manpower, equipment and technically were possessed in time, we would meet the benefits.
Keywords/Search Tags:network security, security policy, active defence, honeypot, honeynet
PDF Full Text Request
Related items