Font Size: a A A

Application-Oriented High-Interaction Honeynet

Posted on:2014-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:S ChouFull Text:PDF
GTID:2248330398472009Subject:Computer technology
Abstract/Summary:PDF Full Text Request
To enter the21st century, the Internet has been growing rapidly, along with the development of the Internet, the network is embodied in all aspects of people’s lives, which have already become an integral part of people’s lives. However, many lawless society has come to understand that the Internet has become a quick access to the interests of channels. There are a variety of cyber attack ways, from sending e-mail spam, identity theft, credit card fraud and Trojan implanted to take advantage of distributed denial of service attacks extortion. With the Internet and people’s lives become increasingly close, it is increasingly important to defend the healthy functioning of our network. The network security workers have researched for decades, but still can not completely guarantee the security of our computer systems. The intruder can often find some incredible system and software vulnerabilities. It is easy to intrude into the computer system that intruders find vulnerability of computer systems.Honeynet and honeypot technology as a novel based on the active defense of the network security technology can not only capture the aggression and attack methods known in the network, which can also capture the unknown network attacks and system Oday vulnerability, so that the networksecurity and network management personnel to better respond to network attacks. Honeypot is a closely monitored computer system, and its value is to be scanned, attacked and captured. Any attempt to connect the honeypot are considered suspicious. Therefore, the analysis of the data collected by the honeypot attacks a great help for us to understand.This paper first explains the research background, significance and Honeynet domestic and foreign research status, and introduces the Honeynet subject’s primary research task. Then detailed analysis and presentation of the honeypot and honeynet technology. The highly interactive honeynet key application-oriented technology--honeypots and customer service side honeypot research and proposed a method based on the characteristics and quantity of the data analysis. Part in the design and implementation of application-oriented high-interaction honeynet detailed implementation methods and functions of the various sub-modules of the Honeynet, vulnerability to attack detection and alarm testing and honeynet honeypot deployment, including systems vulnerabilities website vulnerability, FTP vulnerability. The final is summary of the full paper and future research prospects.
Keywords/Search Tags:honeynet, service honeypot, client honeypot, datacapture, data analysis
PDF Full Text Request
Related items