Font Size: a A A

Research On Mimicry Honeypot Based On Service Computing

Posted on:2015-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:X HanFull Text:PDF
GTID:2308330503975084Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Along with the soaring development of network, virus, worm, Trojan and the malicious permeation of hackers appear and threat people’s normal network activities. Traditional security defense tactics like Firewall and IDS become passive confronting the variant of malicious programs. As an active defenses technique, honeypot is better than passive defense strategy in the aspect of decoy, but traditional honeypot will lose its value once recognized. Inspired by the phenomenon of mimicry in natural biological populations struggle, we propose previously the conception of mimicry honeypot, in which the protective coloration, the warning coloration and evolution mechanism enhance its confusing ability and then make mimicry honeypot achieve better defense.Firstly, based on our previous work the paper further studies mimicry honeypot, presents and formalizes mimicry honeypot model based on service computing as well as discusses both the perception and evolution strategies; Secondly proposes the concept of “service deployment as a service” and constructs the dynamic service deployment model based on service computing in order to solve the deployment issues of honeypot, all functional modules of SdaS are formulized and every unit of service deployment and management model is described in detail. Regarding honeypot as a service improves its deployment effectiveness; At last designs and implements dynamic service deployment and management prototype system and mimicry honeypot prototype based on Web Service using Qt development kit on Linux, then the effectiveness of this prototype and the decoy performance of mimicry honeypot are evaluated, the results of experiment prove the feasibility and effectiveness of mimicry honeypot system based on service computing.
Keywords/Search Tags:mimicry honeypot, service computing, perception, evolution, service deployment and management
PDF Full Text Request
Related items