Font Size: a A A

The Design And Realization Of Invading Supervising Platform Based On Honey

Posted on:2015-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:T M ZhangFull Text:PDF
GTID:2308330473951674Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the network, Problems in the information security of the network are getting more and more attention. In order to prevent the threat from the Internet, We used firewall, authentication technology, access control technology, virus prevention technology, intrusion detection, vulnerability scanning technology, information encryption technology, etc. but these technologies are mainly passive defense, honeypot as a new kind of active defense technology developed in recent years. the difference between the traditional passive defense and honeypot is that detection of precise, invasion metastasis, decoy and so on. The study of network information safety become a hot topic in recent years.Honeypot left System vulnerabilities to attract the intruder intrusion by deliberately, the intruder restrict the activities and capture in a Honeypot to waste the energy and capture the data recording the remote log server, for a network administrator to analysis, strengthen the network defense capability.This paper firstly introduces current situation from the network information security, analysis the network information security technology, network security, network information security threats and network information security in the domestic and international situation, Put forward the problems of security and network security design principles of the campus network, aiming at this problem to introduce the use of design Honeypot.Then from the concept of honeypot, function, development, characteristics, classification are introduced honeypot technology, and entity analyzes the advantages and disadvantages of the virtual honeypot and honeypot,The low interaction honeypot, interaction honeypot and high interaction honeypot is analyzed, Compared with the existing honeypot model, raises and analyses questions about the law of honeypot technology.The central design is the invading supervising platform developed based on Honeypot. The thesis firstly designed in all within the environment of Chongqing Kechuang Professional College. It puts forward the aim of design, the system model, system structure, and function of entry part. Then it analyzes the key technology of every part and the structure of Chongqing Kechuang Vocational College. According to the results of the analysis, virtual Honeypot is used and analyzes the position of Honeypot in the design. Then, the thesis introduces the setting of invading supervising platform based on Honeypot, the structure of supervising platform, network simulation topology script, service script and all parts of the design. Then all parts in the design have tests and the results of the tests are analyzed. The design conforms to the aim and it can be used in practice. Finally, the thesis analyzes the flaw of the design and puts forward the direction of improvement.
Keywords/Search Tags:Network Security, Honeypot, Honeyd, Active defense, Intrusion Detection
PDF Full Text Request
Related items