期刊文献+

蜜罐及蜜网技术研究进展 被引量:35

Advances in the Honeypot and Honeynet Technologies
下载PDF
导出
摘要 蜜罐及蜜网是网络安全领域的研究热点与核心技术,近年来得到了广泛的关注和快速的发展.提出了蜜罐及蜜网技术所面临的挑战.从蜜罐和蜜网的概念及其关键技术等方面对其研究进展进行综述评论.认为系统伪装、体系结构、多源信息融合、攻击分析与特征提取以及计算机取证与法律等问题是目前蜜罐及蜜网研究的关键问题,并讨论了这些问题可能采取的方法.最后对研究的方向进行了展望. In recent years, there have been extensive studies and rapid progresses in honeypot and honeynet, which is one of the hotspots and key techniques in the network security field. Highlighting the challenging issues and research trends for honeypot and honeynet technologies, Presented in this paper is a survey on the up-to-date development in honeypot and honeynet, including definition and key technologies. It is pointed out that problems such as disguise service, architecture, multi-resource data fusion, attack analysis and legal ramifications are the key problems to the study of honeypot and honeynet. Possible solutions to these problems are also discussed respectively. Finally, some future directions of research are given.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第z1期375-378,共4页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60603062) 湖南省自然科学基金项目(06JJ3035) 湖南省教育厅资助科研项目(07C718)
关键词 蜜罐 蜜网 网络安全 入侵检测 预警 honeypot honeynet network security intrusion detection early detection
  • 相关文献

参考文献19

  • 1[1]B Krishnamurthy.Mohonk:Mobile honeypots to trace unwanted traffic early.The ACM SIGCOMM Workshop on Network Troubleshooting (NetT'04),Portland,Oregon,USA,2004
  • 2[2]The Honeynet Project.http://www.honeynet.org,2007
  • 3[3]N Provos.A virtual honeypot framework.The 13th USENIX Security Symposium,San Diego,CA,USA,2004
  • 4[4]Hassan Artail,Haidar Safa,Malek Sraj,et al.A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.Computers & Security,Alexandria,VA,USA,2006
  • 5[5]Z Kuwatly,Masri M Sraj,H Artail.A dynamic honeypot design for intrusion detection.ACS/IEEE Int'l Conf on Pervasive Services (ICPS 2004),Beirut,Lebanon,2004
  • 6[6]Xuxian Jiang,Dongyan Xu,Yi-Min Wang.Collapsar:A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.Journal of Parallel and Distributed Computing,2006,66(9):1165-1180
  • 7[7]C Kreibich,J Crowcroft.Honeycomb:Creating intrusion detection signatures using honeypots.ACM SIGCOMM Computer Communication Review,2004,34(1):51-56
  • 8[8]Urjita Thakar.HoneyAnalyzer:Analysis and extraction of intrusion detection patterns & signatures using honeypot.The 2nd Int'l Conf on Innovations in Information Technology,Dubai,UAE,2005
  • 9[9]Yegneswaran,et al.An architecture for generating semantics-aware signatures.Usenix Security Symposium,Baltimore,MD,2005
  • 10[10]Riebach,Rathgeb,Tdtmann.Risk assessment of production networks using honeynets-some practical experience.In:LNCS 3339.Berlin:Springer,2005

同被引文献251

引证文献35

二级引证文献197

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部