Font Size: a A A

System Model Construction And Performance Analysis Of The Honeypot Based On Petri Net

Posted on:2017-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:H J FengFull Text:PDF
GTID:2348330566457313Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the improvement and development of computer science and technology,how to construct the system model and estimate the performance of the system efficiently has become the research focus.At the same time,with the development of information security technology,to break up the passive situation in the network attack and defense war,researchers proposed an active defense technology – Honeypot.Honeypot is taken seriously and developing since then.However,there are few works on its system model construction and performance evaluation.Therefore,our topic focuses on this problem and makes research on the honeypot's system model construction and performance analysis.We have done some research on honeypot in recent several years.Furthermore,there are also many research achievements on system model construction and performance evaluation with Petri Net.With that we propose the honeypot's system model and the performance evaluation model based on Stochastic Petri Net(SPN).We analyze the honeypot's performance theoretically and make experiments to validate our analysis results.The research content of this paper is as follows:System Model of Honeypot: Firstly,we analyze the present research on the structure of the honeypot and present the honeypot's general architecture.Secondly,we summarize operational principle of the honeypot.Finally,we propose the honeypot's system model based on SPN with the basis of frontal research results.Performance Evaluation of Honeypot: To evaluate the performance of honeypot in the system's defense mechanism,we set up three defense mechanism scenarios with the firewall,IDS and honeypot adding in one by one.Then,we propose performance evaluation models based on SPN and make theoretical analysis for the 3 kinds of defense scenarios.At last,we launch experiments to simulate the three SPN models,validate the models' availability and the validity of our theoretical analysis results of the honeypot's performance with the Petri Net analysis tool – PIPE(Platform Independent Petri Net Editor).Moreover,we make further experiments to evaluate the honeypot's performance.Our theoretical analysis and experiment results demonstrate that honeypot can obviously enhance the system's security,while it gets lots of time and resources to cheating attackers.Therefore,we suggest that the users choose whether to deploy the honeypot or not in their defense mechanism according to their real requirements on security.
Keywords/Search Tags:information security, Honeypot, Stochastic Petri Nets, system model, performance analysis & evaluation
PDF Full Text Request
Related items