期刊文献+

基于欺骗的网络主动防御技术研究 被引量:21

A Study on the Network Active Defense Technology Based on Deception
下载PDF
导出
摘要 针对网络对抗和计算机网络安全防护的现实需求,提出了一种在分布式欺骗空间中实施多重欺骗的网络主动防御技术,通过仿真常用的网络服务程序以及伪造安全漏洞来诱骗入侵者,利用内核级操作控制、文件系统镜像和信息欺骗,构建基于Windows和Linux平台的欺骗性操作环境,实现了对网络入侵全过程的欺骗、监视与控制。该技术突破了普通蜜罐技术单一欺骗层次的局限性,使得欺骗性、交互性和安全性同时得到明显提高。 A network active defense technology based on multi-layers deception in the distributed deception space is proposed to meet the needs of network countermeasure and network security. This technology simulates usual network service programs and forges vulnerabilities to lure the intruder. With operation control at kernel level, file system mirror and information deception, it creates the deceiving operating environment on the platform of Windows and Linux. Thus the process of intrusion is fully deceived, monitored and controlled. This technology breaks the limitation of a single layer deception used by other general honeypots, and obviously promotes the level of deception, interaction and ensures security.
作者 姚兰 王新梅
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2008年第3期65-69,共5页 Journal of National University of Defense Technology
基金 国家863计划重大专项资助项目(2003AA146010)
关键词 网络欺骗 主动防御 蜜罐 网络服务仿真 操作行为控制 network deception active defense honeypot network service simulation operation control
  • 相关文献

参考文献8

  • 1Spitzner L. Honeypots: Tracking Hackers[M]. Boston: Addison-Wesley, 2003:73 -86.
  • 2Spitzner L. Honeypots: Catching the Insider Threat[C]//Proceedings of the 19^th Annual Computer Security Applications Conference, 2003:170 - 179.
  • 3Spitzner L. Problems and Challenges with Honeypots[ EB/OL]. http: //www. security focus. com/infocus/1757, 2004.
  • 4Provos N. A Virtual Honey-pot Framework[ EB/OL]. http://www. usenix. org/event/sec04/tech/full _ papers/provos/provos _ html, 2004.
  • 5Spitzner L. Open Source Honeypots: Learning with Honeyd[EB/OL].http://www.security focus.com/infocus/1659, 2003.
  • 6Netsec. Specter Intrusion Detection System[ EB/OL]. http://www. specter. com, 2004.
  • 7Recourse Technologies Inc. Mantrap: A Secure Deception System[ EB/OL]. http://www.recourse.com, 2001.
  • 8The Honeynet Project. Know Your Enemy:Learning about Security Threats(2^nd Edition)[M]. Boston: Addison-wesley, 2004.

同被引文献138

引证文献21

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部