Font Size: a A A

Virtual Honeypots In The Campus Network Of Research And Application

Posted on:2014-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:X Z WuFull Text:PDF
GTID:2268330425467783Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, campus network has been builtin various universities. It has played inestimable roles in speeding up informationprocessing, the rational allocating of education resources, making full use of highquality education resources, improving the work efficiency, reducing labor intensity,realizing resource sharing and so on. Because of many new attacking methodsonline----Internet worms and denial of service----and the ignorance for campus cyber incollege, large amount of security incident come in a continuous stream. Many problems,such as the abnormal of the manage system, the broken of data and others, have broughtinconvenient to university routine work. How to build a secure and reliable campusnetwork become the urgently problem for now.Now, the main network security technologies have firewall, intrusion detection,access control, data encryption, security authentication, the security technology, and soon. Most of them belong to passive defense, which are depending on the original rulesand feature library and having nothing to do with several new attacks. Virtual honeypot,an active defense technology, protects the real network system through the imitatingtruly information to obtain attacking data, in the meantime, analyzing the variousattacks of attackers to find effective methods.Based on the analysis of network environment and the threats in Hunan Universityof commerce Beijin College and the particularity of the campus network, the articleproposes a positive network security system------campus network security architecturebased on virtual honeypot, using Honeyd builds a virtual honeypot system, on the basisof the protection of the existing network security, the main gathering information WEBserver attack and the latest virus attack. It can analyze the collected information; repairthe leak of campus network server system on time, and make response to the new virusattacks. While taking advantage of Honeyd to automatically generate intrusion detectionsoftware Snort attack signatures do further research for better protection of our hospitalcampus network security.
Keywords/Search Tags:virtual honetpot, network security, honeyd
PDF Full Text Request
Related items