Font Size: a A A

The Research And Realization Of Voluntary Defense System Based On Honeynet

Posted on:2014-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:X X LiuFull Text:PDF
GTID:2268330392972526Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the constant innovation and rapid development of computer networktechnology, it plays an important role in our daily life and has a far-reaching effect oneconomic, social and military aspects. At the same time, the network security problemis increasingly serious, which caused by the vulnerability of computer networkinformation facilities. Since the traditional protective measures are based on thecharacteristics rule matching and passive security policy, it is not easy to come up withan effective response to unknown network security problems. In view of this, it is afuture research trend of remarkable research significance to build a set of networksecurity protection system based on the active safety strategy with real-timeperformance, high efficiency and effectiveness and independent protection of computernetwork infrastructures.This paper designed an independent defense system based on a mature technology,Honeynet, and combined the improved version PDRR security model, using feedbackloop model of software engineering. This paper makes an experimental platform of theindependent defense system possible, based on virtual network. The protective networkenvironment functions include: real-time monitoring response to threats, automaticprotection strategy, track attacker information etc. This paper conducted researches inthe following aspects:①This paper analyzed the significance and the background of the research, withthe aim of understanding the technology, Honeynet, and the research of networksecurity model both at home and abroad.②This paper researched the construction goal and the theoretical basis of theindependent defense system, including the system architecture, operation principle,network topology and detailed designs of the system key module.③This paper designed an operation environment as required by the experimentalplatform requirements which is based on the design of independent defense systemresearch, realized the key module of the experimental platform, and showed keycommand and implementation interface as well.④This paper tested the practical effects of the experimental platform with a varietyof network threat means, and then analyzed the test results.⑤This paper summed up the results based on the research design of independent defense system and the realization process of the experimental platform, as well as theimprovement and consideration of the present independent defense system.
Keywords/Search Tags:Computer Network, Threat, Security Model, Honeynet, Independent Defense System
PDF Full Text Request
Related items