Font Size: a A A

Research On Attack Target Construction Based On Honeynet

Posted on:2014-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:X ChengFull Text:PDF
GTID:2268330425971182Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network attack training platform provides an important support for enhancing information security awareness and security protection technology of the internet users, attacking targets is an important part of it, its success directly affects the ultimate effect of the whole training platform. In the meantime, honeynet technology, as a new type of the active defense network security technology, has been valued by information security.This dissertation establishes network attack targets by honeynet system. Firstly, we do some in-depth researches and analysis of virtual honeynet technology, introduce the concepts such as honeyhot, honeynet, real honeynet, virtual honeynet, and focus on explaining the implement methods of virtual honeynet and honeynet gateway Roo; secondly, we conclude current methods of network attack and establishing attack targests, design system-level and application-level construction plan of establishing attack targets, and research the configuration method of attack targets; afterwards, we establishes the virtual honeynet system based on VMware and give the topological structure and network configuration of virtual honeynet, focus on introducing the installment and configuration of VMware workstation and honeywall Roo; finally, we design and realize the establishment of attack targets based on honeynet system, explain the theory and process of network attack training, set up testing environment of attack targets, complete the configuration of network attack targets and make an attack test of targets by network attack training platform.This dissertation provides an important support for understanding the purposes, methods and tools of hacker attack, enhancing the prevention capacity of information security.
Keywords/Search Tags:Honeynet, Network Attack Target, Attack Test
PDF Full Text Request
Related items