期刊文献+

基于蜜罐的主动网络安全系统的研究与实现 被引量:11

Research and Implementation of an Active Network Security System Based on Honeypots
下载PDF
导出
摘要 采用自动的大规模扫描,在发现系统漏洞后,能够使对手在短时间内攻破计算机系统。传统的蜜罐系统在处理这些问题时有很多不足,因为其签名是可检测的。针对这些不足,本文从另一个角度构造了一个基于蜜罐的主动网络安全系统(Active Network Security System,ANSS)的诱骗系统。 ANSS位于真实的网络环境中,可以自始至终捕获到黑客的行为。仿真实验表明,ANSS使网络的安全性能达到了一个较高的水平,对入侵行为的监控和预防有着重要的意义。 Exploit automation and massive global scanning for vulnerabilities enable adversaries to compromise computer systems shortly after vulnerabilities become known. Traditional honeypots have shortcomings to deal with these problems because their signatures can be inspected. Aiming at current research state, the paper constructs an Active Network Security System (ANSS) from another point of view, i.e., ANSS situated in a real network circumstance. ANSS is the same as other systems in Internet, and it can capture actions of hacker from beginning to end. The simulation results indicate that ANSS can elevate network's security performance to a higher level and ANSS has important impact on forecast and monitor attack activities.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第3期351-354,共4页 Journal of Electronics & Information Technology
基金 863项目(2002AA776030)江苏钳高校自然科学研究计划(03kjb520090)中兴基金资助课题
关键词 网络安全 诱骗系统 蜜罐 Network security, Decoy system, Honeypot
  • 相关文献

参考文献11

  • 1夏春和,吴震,赵勇,王海泉.入侵诱骗模型的研究与建立[J].计算机应用研究,2002,19(4):76-79. 被引量:49
  • 2The honeynet project. http://projeet.honeynct.org.
  • 3Lance Spitzner. Definitions and value of honeypots. Http://www.tracking-hackers.com/papers/honeypots.html, 2003,5.
  • 4Deception Toolkit. 2001. http://www.all.net/dtk/index.html.
  • 5Intrusion battleground evolves. http://www. nwfusion. com/reviews/2001/1008bg.html.
  • 6Review: Intrusion-detection products grow up. http://www.nwfusion.com/reviews/2001 / 1008rev. html.
  • 7The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html.
  • 8Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots.
  • 9杨书凡,李方敏,朱剑丘,刘新峰.架构主动方式的网络安全系统[J].通信学报,2003,24(7):170-175. 被引量:3
  • 10Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf.

二级参考文献14

  • 1SCHWABE J, ROHRING N. Lessons learned from deploying a honeypot[J].Information Security Bulletin,2000,11(1): 128-224.
  • 2SPITZNER L. The value of honeypots[EB/OL]. www.securityfocuces.com,Dec 2000.
  • 3RAIKOWD. Building your own honeypot[EB/OL], www.linuxsecurity.com,Jun 2000.
  • 4COHEN F. The Deception toolkit home page[EB/OL].www.all.net,Sep 2001.
  • 5Recourse technoiogics inc. honeypot effectiveness study[EB/OL].www.recourse.com/news/press/releases/r102400.html,Sep,2000.
  • 6The Huneynet Project .Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Biackhat Community [M]. USA Addison-Wesley Pub, 2000.
  • 7MORAN D B.Tapping and tracking hackers[EB/OL]. www.recourse.com, July 2000.
  • 8BROCKWELL P J, DAVIS R A.Times Series:Theory and Methods[M].Springer,Reihe Pub,1991.
  • 9Shipley,Greg.Anatomy of a Network Intrusion[].Network Computing.1999
  • 10Rubin,Jeffrey,O’Shea,Timothy.Axent NetProwler: Advanced Intrusion Detection on the Loose[].Network Computing.1999

共引文献48

同被引文献50

引证文献11

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部