期刊文献+

基于系统和网络特征的蜜罐识别技术 被引量:4

Anti-Honeypot based on system and network characteristic
下载PDF
导出
摘要 蜜罐是一个在网络上监视和跟踪非法入侵者的系统,通常认为蜜罐是很难识别的。为了进一步推动蜜罐的发展,讨论了当前的基于系统特征的蜜罐的识别技术,在前人的基础上进一步提出了基于网络特征的新的蜜罐识别技术,即根据目标机提供的服务和请求回显时间来判断目标机是真实的主机还是蜜罐,并用这些技术做了实验,验证了这些技术在实际应用中的可行性。 Honeypot are deployed on networks to detect and monitor misuse of computer and network resources by unauthorized individuals, and it is usually assumed that Honeypots are hard to detect. For the sake of improving the development ofhoneypot, the current anti-honeypot is discussed based on system characteristic, on the foundation of senior people the anti-honeypot based on the network features is put forward, namely according to the service provided by the goal machine and the time echo requests to judge the goal machine is the real machine or honeypot, and the experiment of these technologies confirmed these technologies are feasible in the practical application.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第7期1622-1624,1772,共4页 Computer Engineering and Design
基金 上海市教育委员会科研基金项目(04EB12)
关键词 蜜罐 蜜罐识别技术 数据捕获 数据控制 隐藏 Honeypot Anti-Honeypot data capture data control concealment
  • 相关文献

参考文献10

  • 1Honcynet Project.Know your enemy[EB8OL].http://www.honeynet.org/papers/honeynet/index.html.
  • 2Chunming Rong.Geng Yang.Honeypots in Blackhat mode and its implications[C].USA:Proceedings of the Fourth International Conference on Parallel and Distributed Computing,Applications and Technologies,2003:185-188.
  • 3Iyad Kuwatly,Malek Sraj,Zaid AI Masri,et al.A dynamic Honeypot design for intrusion detection[C].USA:Proceedings of the IEEE/ACS ICPS,2004:95-104.
  • 4Maximillian Domseif,Thorsten Holz.Christian N Klein.NoSEBrEaK-Attacking Honeynets[C].USA:Proceeding of IEEE Workshop on Information Assurance and Security,2004:123-129.
  • 5Laurent Oudot,Thorsten Holz.Debating Honeypots:Network issues[EB/OL].http://www.securityfocus.com/infocus/1805.
  • 6IEEE standards[S].http://standards.ieee.org/regauth/oui/oui.txt.
  • 7Neil C Rowe,Binh T Duong,John Custy E.Fake Honeypots:A defensive tactic for cyberspace[C].USA:Proceedings of Workshop on Information Assurance,IEEE,2006:223-230.
  • 8曹登元,周莲英,刘芳.针对应用层未知攻击的蜜罐系统框架的研究与实现[J].计算机工程与设计,2006,27(5):765-767. 被引量:4
  • 9王海杰,鲁汉榕,胡亚慧.基于移动Agent和蜜罐的入侵检测系统分析与设计[J].计算机工程与设计,2006,27(24):4786-4788. 被引量:1
  • 10郑君杰,肖军模,刘志华,王晓蕾,王宏涛.基于Honeypot技术的网络入侵检测系统[J].电子科技大学学报,2007,36(2):257-259. 被引量:12

二级参考文献19

  • 1张文科,张文政,陈雷霆.蜜罐技术在防御分布式拒绝服务攻击中的应用[J].通信技术,2003(5):95-96. 被引量:7
  • 2王影,卢显良.入侵检测规则共享机制[J].实验科学与技术,2004,2(3):30-32. 被引量:4
  • 3丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 4Baumann R, Plattner C. The honeypot white papers [EB/OL].http://www.rbaumann.net, 2004.
  • 5Lance Spitzner. Honeypot: Tracking hackers [M]. USA: Addison Wesley, 2002.
  • 6Honeynet Project.Know your enemy:Honeynets[EB/OL].http://www. honeynet.org, 2004.
  • 7Lance Spitzner. Honeypots: Catching the insider threat [A]. Annual Computer Security Applications Conference[C]. USA .2003.
  • 8Yin Chunmei.Honeypot and scan detection in intursion detection system[C].Canada:IEEE CCECE,2004.1107-1110.
  • 9Xiong Jia-jun,Zhang Jing.A kind of multilayer intrusion detection system using mobile agent[C].Xi'an:Proceedings of the Second International Conference on Machine Learning and Cybernetics,2003.1951-1955.
  • 10Lance Spitzner.Honeypots:Tracking hackers[M].北京:清华大学出版社,2004.

共引文献14

同被引文献11

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部