期刊文献+

利用蜜罐技术架构网络战训练虚拟靶场环境 被引量:3

Construction of a virtual target circumstances for cyber war training by honeypot technology
下载PDF
导出
摘要 从蜜罐技术的分类与功能出发,结合网络战虚拟靶场环境建设的目标,探讨了蜜罐技术在虚拟靶场中运用的具体设计与构建.讨论了用蜜罐技术架构网络战虚拟靶场环境的设计要素,给出了相应的模块结构图.在目前流行的蜜罐技术基础上,利用相关工具软件设计了用一个蜜网构成的网络战虚拟靶场环境. By building a perfect virtual circumstance, the owner can study the attack's skills and means, find out new bug of computer system and test cyber war's new tools. In accordance with the classification of honeypot and its functions, and combined the target of building a virtual target circumstances for cyber war training, the design of the application of honeypot technology to a virtual target circumstances and its construction were discussed. The design factors of building a virtual target circumstances for cyber war training by honeypot technology was difcussed, and the corresponding modules structure was presented. A virtual circumstances by using the new honeypot's technologyies and tools was built.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第1期61-63,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(6052047) 湖北省青年杰出人才基金资助项目(2005ABB006).
关键词 蜜罐 网络战训练 虚拟靶场 honeypot cyber war training virtual target circumstances
  • 相关文献

参考文献5

  • 1DENNINGDE.信息战与信息安全[M].北京:电子工业出版社,2003..
  • 2Moran D B. Trapping and tracking hackers: collective security for survival in the internet age[C]//Third Information Survivability Workshop. [s.l.]:IEEE Computer Society Press, 2000.
  • 3Stoll C. Stalking the wily hacker[J]. Communications of the ACM, 1988, 31(5): 484-497.
  • 4殷联甫.主动防护网络入侵的蜜罐(Honeypot)技术[J].计算机系统应用,2004,13(7):29-31. 被引量:19
  • 5Cheswick W, Bellovin S M. Firewalls and internet security: repelling the wily haeker[M]. New York:Addison-Wesley, 1994.

二级参考文献5

共引文献20

同被引文献20

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部