Font Size: a A A

The Research And Design Of E-government Security System Based On Honeypot

Posted on:2013-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:L L WangFull Text:PDF
GTID:2248330395980688Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid expansion of the Internet and the rapid increase of Internet users, the security risks of the Internet is increasingly grim, and the original damage caused by a single host security incidents could spread to other systems, causing more damage to the host and the paralysis of the entire system. In China, the e-government has become an important support for the government at all levels to carry out administrative work, and the various the business subsystems are based on Internet/Intranet environment. However, the diversity and variability of the e-government system network environment, as well as the vulnerability of the system itself, determine the objective existence of the e-government system network security threats. The administrative activities are different from the business activities in the general sense, so it is related to the interests of the Party and government organs and even the whole country. Government information is more authoritative, more serious, and more important than the business information. Once the e-government network security threats, or in a paralyzed state, is bound to be huge loss to the government at all levels. E-government network will not only need to deploy a variety of security products against external network attacks, but also to respond to attacks from within the government network, so the security requirements of the e-government system would naturally be more stringent than the e-commerce system, and the solution program is also more stringent.Firstly, this article analyze the network security status of e-government. Summarizes the various security issues faced by e-government network combined with the current Internet, analyze the external network intruders or internal users that may be caused by network security threats, and propose the appropriate security policy for the design of guidance of e-government network security defense system.Then, it studies the ideas and the basic principles of honeypot technology. The honeypot technology elaborated the concept, characteristics, classification, works principles, the honeypot deployment-related factors and the honeypot redirect technology, data capture technology, data control technology, data analysis technology, log management technology. Honeypot technology as a proactive network security defense means, can collect, record, analyze and forensics invasion of this attack, and can also trick intruders from entering an accused in the network environment, to prevent the attacks launched its real goal.Finally, based on the analysis of the e-government network security defense system model, the honeypot system structure, this paper designs the e-government system design based on the honeypot. And detailed elaborate the design and implementation of six sub-modules:data control module (module firewall, intrusion detection module), redirect module data capture module, a single point monitoring and early-warning module, log management module and data analysis module. The experimental test proved that the system is capable of early against malicious attacks, reduce or prevent redirection suspicious access. Combination with honeypot technology can more easily achieve the expansion of the function, and improve the defense capabilities of the e-government network security.
Keywords/Search Tags:honeypot, e-government, safety defense, data capture
PDF Full Text Request
Related items