期刊文献+

分布式虚拟陷阱网络系统的设计与实现 被引量:4

Design and Implementation of Distributed Virtual Honeynet System
下载PDF
导出
摘要 目前大部分安全技术被设计用来阻止未授权的可疑行为获取资源,同时安全工具是作为一种防御措施被布置,所以它们对网络的保护有限。在分析国内外研究现状的基础上,针对现有网络安全工具在入侵检测以及防护等方面的不足,设计和实现了分布式虚拟陷阱系统。该系统所分布的代理由混合Honeynet和低交互的Honeypot构成,降低了Honeypot固有的风险,增加了模拟的真实性,弥补了现存的各类Honeypot的不足。作为一种动态安全防御机制,可以有效地提高大规模网络的整体安全性,是传统安全机制的有力补充。 Most security technologies are designed to prevent unauthorized activity to resources, and security tools are put into place as a defensive measure. Therefore there is some shortcoming in protecting network. After analyzing the research situation and the shortcoming of security tools in intrusion detection and in protecting system, distributed virtual honeynet system is studied and implemented. The system is composed of hybrid virtual honeynet and low-interaction honeypot, which reduces the inherent risk of honeypot, adds the simulation's trueness, and it makes up the shortcoming of exiting different type honeypots. As a dynamic security defensive mechanism, it can improve effectively integrate safety of large scale of network, and is completely supplement of traditional security mechanism.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第18期163-165,177,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60403032)
关键词 网络安全 入侵检测 蜜罐 陷阱网络 Network security Intrusion detection Honeypots Honeynets
  • 相关文献

参考文献5

  • 1Levine J,LaBella R,Owen H,et al.The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks[EB/OL].http://www.tracking-hackers.com/papers/gatech-honeynet.pdf,2004-04-28.
  • 2Rahmat B,Azman S,Wee H C.Honeypot:Why We Need a Dynamics Honeypots[C].Proceedings of International Conference on Information and Communication Technologies:From Theory to Applications,2004:565-566.
  • 3Anderson P,Deception:A Healthy Part of Any Defense-in-Depth Strategy[EB/OL],http://www.sans.org/rr/whitepapers/policyis sues/506.php,2001.
  • 4Spitzner L.Honeypots:Tracking Hackers[M].Addison-Wesley,2002.
  • 5Cheswick W R.An Evening with Berferd,in Which a Cracker is Lured,Endured,and Studied[EB/OL].http://cne.gmu.edu/modul es/acmpkp/security/texts/CRACKER.PDF,2004-05-10.

同被引文献19

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部