期刊文献+

抵御蠕虫攻击的一种方法-Honeypot系统 被引量:1

Honeypot System to Defend Worm Attacks
下载PDF
导出
摘要 Internet大面积遭受蠕虫攻击的事件时有发生,针对这种问题,引入Honeypot技术,结合入侵检测系统(IDS)、数据挖掘提出了一种解决办法:将Honeypot置于DMZ中,利用其欺骗地址空间技术覆盖服务器中没有用到的IP地址,捕获蠕虫;IDS监控流入网络的数据包,对入侵作出反映;系统日志异地保存。该系统能有效抵御目前已经出现的蠕虫攻击,同时对新出现的目前未知的蠕虫攻击也有很好的防御效果。 Recentely, more and more worm attacks happen on Internet. According to this situation, honey-pot technology with IDS and data mining is used to resolve the problem; Honeypot is put in DMZ. The address and space spoofing technology is utilized to cover the unused IP address and space. Then the worms are captured. IDS monitors the data pachet that flows into the internet, and then reacts to the attacks. The system log keeps it in other places. This new approach could defend present known worm attacks effectively, and have effect on some future unknown work attacks.
作者 黄敏
出处 《西南科技大学学报》 CAS 2005年第2期10-12,22,共4页 Journal of Southwest University of Science and Technology
关键词 密罐 数据挖掘 入侵检测 蠕虫病毒 Honeypot data mining intrusion detecion worm virus
  • 相关文献

参考文献4

二级参考文献22

  • 1[1]Stoll C. Stalking the wily hacker[J]. Communications of the ACM,1988, 31(5) :484 -497.
  • 2[2]Cheswick B. An Evening with Berferd In Which a Cracker is Lured,Endured, and Studied[ A]. Proceedings of the Winter 1992 Usenix conference[ C], 1992.
  • 3[3]Cohen F. Internet Holes - Internet Lightning Rods[ J/OL]. Network Security Magazine, http://all. net/journal/netsec/9607 -2. html,1996.
  • 4[4]Cohen F. A Note on the Role of Deception in Information Protection[J]. Computers and Security, 1998, 17:483 - 506.
  • 5[5]Cohen F. A Mathematical Structure of Simple Defensive Network Deceptions[J]. Computers and Security, 2000, 19:520 -528.
  • 6[6]Cohen F. Deception Toolkit [ EB/OL]. http://www. all. net/dtk,1998.
  • 7[7]Neo Worx. Specter[ EB/OL]. http://www. specter. com, 1999.
  • 8[8]Recourse Technologies Inc. Mantrap[ EB/OL]. http://www. recourse. com, 1999.
  • 9[9]Network Associates Technology Inc. CyberCop Sting[ EB/OL]. http://www. nai. com, 1999.
  • 10[10]Spitzner L. Honeypots: Definitions and Value of Honeypots[ EB/OL]. http://www. enteract. com/~ lspitz/honeypot. html, 2002 -03 - 17.

共引文献59

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部