Font Size: a A A

Study And Design Of Universities' Campus Network Security Based On Honeypot Technology

Posted on:2014-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:C X LiFull Text:PDF
GTID:2428330488499540Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of Internet,more and more applications through the network to achieve,while the network 's security also faces enormous challenges.Campus network as a special group,is also facing many problems and challenges.In this paper,how to ensure the safety of the campus network to do some in-depth research and analysis,using honeypot technology as a campus network security solutions.In this paper,in-depth study,understand and master the.knowledge of network security,familiar with the honeypot system works and the way many of the current domestic and international honeypot type system were studied,analyzed and used to understand the current hacking or cyber attacks for different systems adopted by means of attack,attack,attack and attack tools purposes.Using honeypot network hackers and attackers trick,a variety of data capture intruders,targets,thereby enhancing the authenticity of honeypots,while deliberately set honeypot loopholes complicate it even more hidden clever,so the intruder must spend a lot of time and effort to capture honeypot system.At the same time,also increased the honeypot system concealment,even for experienced attackers also difficult to see through honeypot system,thereby improving honeypot system self-defense capability.Finally,from the data control,data capture,log management,system response and virtual machine configuration bridge honeypot technique based on the realization of the campus network security system architecture design,and technology for campus-based honeypot network security system for functional testing,comparison tests and connectivity testing.Test results show that using honeypot technology can effectively improve the security of the data in the log to ensure the honeypot system data is not modified by hackers discovered and removed.
Keywords/Search Tags:Honeypot, Nnetwork security, Data Capture
PDF Full Text Request
Related items