Font Size: a A A

Honeypot Technology In Network Security Design And Application

Posted on:2013-06-17Degree:MasterType:Thesis
Country:ChinaCandidate:H ChenFull Text:PDF
GTID:2268330401465306Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The tentacles of computer networks in today’s world has been extended to everycorner of the earth, and hydropower, transportation, and its leadership increasinglyaffect our lives, because it has become like electricity and other people’s work andlifestylean integral part. Deeper understanding of computer networks, will know theconstant attacks of knowledge networks and network, network expansion has broughtmore information and network insecurity, a serious threat to network security.Effective protection of the computer system or network is the core of informationsecurity technology. It involves a lot of technology to protect network security attacks,attacks on the network the attacker’s level of technology, encryption and authenticationtechnology, firewall, data, technology, anti-virus, intrusion detection technology, thesetechnologies are passive protection systems.With the advent of the information age, the computer network secuogy ismoreregarded as an effective way to attack. Honeypot technology provides an effectiveway for in-depth understanding of hacking, can improve the organization’s networksecurity. This paper discusses the technology of honeypot and working mechanism andrealizationmethods advanced form of honeynet. Firstly, this paper introducess thepresent situation, of internet satfety,The safety questions of internet and the kindsof attacks, method, and speak out a new way of honeypot.second, analyse the honeypotwork.The author discussed the design and application of honeypot by make use of DTKApache Toolkit, and practiced Telnet service.Test results show that: the honeypot has become one of effective tools for thesecurity officer deal with hackers and worm virus. Compare the before with the after ofan attack which made by worm virus to a specially configured honeypot, it shows thatthe details of system registry revision and newly built document which attacked byworm virus. The worm virus detailed intrusion can be find by the capture of packetsniffer software.
Keywords/Search Tags:Network Security, Honeypot, Honeynet, Intrusion Detection
PDF Full Text Request
Related items