期刊文献+

一种基于动态蜜罐和实时仿真的蜜网设计 被引量:4

Honeynet Design Based on Dynamic Honeypot and Real-time Emulation
下载PDF
导出
摘要 本文提出一种新的、基于动态蜜罐和实时仿真入侵目标的蜜网设计方案,并对方案的安全性进行了分析。采用该蜜网设计方案,能更加有效地部署和维护蜜网系统,从而增强了整个网络系统以及蜜网系统自身的安全性。 this article propose a new honeynet design which is based on an enhanced concept of dynamic honeypot and real-time emulation of victims. Also analyzes the security effectiveness of the new design. The paper concludes that, through the adoption of our honeynet design, the deployment and maintenance issues inherent in honeynet can be addressed effectively, hence enhancing the security of the network system and the honeynet itself.
出处 《微计算机信息》 北大核心 2006年第12X期28-30,共3页 Control & Automation
基金 国家自然科学资金项目(90412007) 863项目(2001AA414220)
关键词 蜜罐 动态蜜罐 蜜场 实时仿真入侵目标 Honeypot, Dynamic honeypots,Honeyfarm,Real-time emulate intrusion victims
  • 相关文献

参考文献5

  • 1LANCE SPITZNER.Dynamic honeypot[EB/OL].http://www.securityfocus.com/infocus/1731,2003..
  • 2KUWATLY I,SRAJ M,AL MASRI Z,ARTAIL H.A Dynamic Honeypot Design for Intrusion Detection[A].ICPS 2004 IEEE/ACS International Conference on Pervasive Services[C].NW Washington DC USA:IEEE Computer Society,2004.95-104.
  • 3HE XY,LAM KY,CHUNG SL,CHI CH,SUN JG.Real-time emulation of intrusion victim in HoneyFarm.content computing[A],Proceedings Lecture Notes in Computer Science 3309[C].Berlin,Germany:SPRINGER-VERLAG BERLIN,2004.143-154.
  • 4BRIAN D,DAVISON,RURGERS.A Web Caching Primer.IEEE Internet Computing[J],2001 (5):38-45.
  • 5刘素芹,王菁.主动网络及其应用[J].微计算机信息,2003,19(8):69-70. 被引量:11

二级参考文献4

  • 1Smith J M. , et al . Activating Networks: a progress report . Computer ;1999 (324).
  • 2Schwarts B, et al. Smart Packets: Applying Active Networks to Network Management. ACM Trans. on Computer Systems; 2000 (18).
  • 3S.Merugu, S.Bhattacharjee , E.Zegura , K.Calvert . Bowman: A Node OS for Active Network. Infocom , 2000.
  • 4DECASPER D, et al. A scalable, high performance active network node. IEEE Network, 1999 (1).

共引文献10

同被引文献39

  • 1张杰鑫,庞建民,张铮.拟态构造的Web服务器异构性量化方法[J].软件学报,2020,31(2):564-577. 被引量:10
  • 2李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 3SPITZNERL.Honeypots:追踪黑客[M].邓云佳,译.北京:清华大学出版社,2004:221-230.
  • 4NFR Security, Inc. Back officer friendly [ EB/OL ]. http ://www. nfr. com/resource/backofficer, php.
  • 5COHEN F. The deception tool kit [ EB/OL]. (1998). http://all. net/dtk/dtk, html.
  • 6SPITZNER L. Open source honeypots: learning with Honeyd [ EB/ OL]. (2003- 01- 20 ). http://www, security focus, com/infocus/ 1659.
  • 7Recourse Technologies,Inc. Mantrap:a secure deception system[ EB/ OL]. (2001). http://www., recourse, com.
  • 8Honeynet Project. Know your enemy : Honeynets [ EB/OL ]. http :// project, honeynet, org.
  • 9杨青.基于主动防御的蜜罐技术研究[J].信息技术与信息化,2007(4):69-71. 被引量:5
  • 10HONEYNET PROFJECT. Know Your Enemy: Genii Honeynets [EB/OL], (2003-06-27) [2006-09-28]http://www.honeynet.org/papers/kye.html.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部