期刊文献+

基于欺骗的网络主动防御技术研究 被引量:5

Research on Active Network Defence Technology Based on Deception
下载PDF
导出
摘要 在蜜罐中综合运用各种欺骗技术能达到主动保护网络的目的。准确定义了在网络防御中欺骗的概念,分析了各种欺骗的目的和用途,以及分类和发展过程,并详细阐明了运用在蜜罐上的各种欺骗技术原理,包括指纹信息模拟、随机服务器、重定向、牢笼和虚拟命令等。最后讨论了如何根据不同的欺骗目的综合选择合适的欺骗技术进行欺骗部署。 Honeypots take several deception technology to protect network. This paper will explain actively the deception technology, including it's definition,purpose,category and development. It analyzes the principles of most kinds of deception technology,including banner simulation, random server, redirection, cage and virtual command. It discusses how to choose proper deception technology to deploy deception policy baesd on different deception purposes.
作者 吴馨 黄皓
出处 《计算机应用研究》 CSCD 北大核心 2006年第11期92-95,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2003AA142010) 江苏省高技术研究项目(BG2004030)
关键词 欺骗 主动防御 蜜罐 蜜网 Deception Active Defence Honeypot Honeynet
  • 相关文献

参考文献16

  • 1Lance Spitzner. The Value of Honeypots, Part One: Definitions and Values of Honeypots[ EB/OL]. http://www, securityfocus, com/infocus/1492, 2001.
  • 2Neil C Rowe, Mikhail Auguston, Doron Drusinsky, et al. Research on Deception in Defense of Information Systems [ EB/OL]. http://www. dodccrp, org/events/2004/CCRTS _ San _ Diego/CD/papers/071. pdf.
  • 3Lance Spitzner. Know Your Enemy : A Forensic Analysis [ EB/OL].http://www, securityfocus, com/infocus/1255, 2000.
  • 4Recourse Technologies, Sans InfoSec Reading Room. The Evolution of Deception Technologies as a Means of Network Defense[ EB/OL]. http://scholar, google, com/scholar? hl = en&lr = &newwindow = 1&q = cache: XRJSbKPyBNUJ: unit22, in-berlin, de/studies/diploma/cdrom/bib/55 _evolution. pdf.
  • 5Honeynet Project. Know Your Enemy : Honeynets [ EB/OL ]. http ://www. honeynet, org/papers/honeynet/index, html, 2003.
  • 6Honeynet Project. Know Your Enemy: Gen Ⅱ Honeynets [ EB/OL ].http ://www. honeynet, org/papers/gen2/index, html, 2003.
  • 7Laurent Oudot. Honeypots for Distributed Denial of Service Attacks[ EB/OL]. http://www, securityfocus, com/infocus/1740, 2003.
  • 8The Honeynet Project. Know Your Enemy: Sebek[ EB/OL]. http://www. honeynet, org/papers/sebek, pdf, 2003.
  • 9The Honeynet Project. Know Your Enemy : Honeywall CDROM [ EB/OL]. http://www, honeynet, org/papers/cdrom/roo/index, html,2005
  • 10Roshen Chandran, Sangita Pakala. Simulating Networks with Honeyd[ EB/OL]. http ://www. paladion, net/papers/simulating_networks_with_honeyd, pdf.

同被引文献13

  • 1徐强,张瑜.蜜罐系统的研究与设计[J].福建电脑,2006,22(10):94-95. 被引量:3
  • 2郑君杰,肖军模,刘志华,王晓蕾,王宏涛.基于Honeypot技术的网络入侵检测系统[J].电子科技大学学报,2007,36(2):257-259. 被引量:12
  • 3冯朝辉,范锐军,张彤.Honeynet技术研究与实例配置[J].计算机工程,2007,33(5):132-134. 被引量:7
  • 4刘明康.分布式主动防御系统研究西安电子科技大学学报,2010(13).
  • 5刘明康.分布式主动防御系统研究[J]西安电子科技大学学报,2010(13).
  • 6张建民.基于P2P的分布式主动防御技术[J]信息安全与技术,2011(05).
  • 7Cheng J R, Yin J P, Liu Y, et al. Advances in the honeypot and honey- net technologies [ J ]. Journal of Computer Research and Development, 2008,45 ( S1 ) : 375- 378.
  • 8Liu Dongxia, Zhang Yongbo. An intrusion detection system based on honeypot technology[ C]//Proc of International Conference on Com- puter Science and Education. 2012:451-454.
  • 9LANCE S. Dynamic honeypots [ EB/OL ]. [ 2010-11- 02 ]. http :// www. securityfocus, com/infocus/1720.
  • 10史伟奇,程杰仁,唐湘滟,刘运,张波云.蜜罐技术及其应用综述[J].计算机工程与设计,2008,29(22):5725-5728. 被引量:14

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部