期刊文献+

虚拟蜜罐技术在网络安全中的应用研究 被引量:4

Study on the Application of Virtual Honey-pot Technology to Network Security
下载PDF
导出
摘要 面对网络上复杂而多变的黑客攻击,提出利用虚拟蜜罐技术主动吸引黑客的攻击,来监视和跟踪入侵者的行为并进行记录,进而研究入侵者所使用的攻击工具、攻击策略和方法。笔者论述了虚拟蜜罐技术的基本概念,通过3方面的应用实例,较为系统地研究了虚拟蜜罐技术在网络安全中的应用,证明虚拟蜜罐技术可以有效收集攻击信息,保护实际工作网络,并讨论了虚拟蜜罐的优点和风险。 Aiming at various complex and flexible Hacker' network attacks, an effective method is presented, in which the Virtual Honey-pot Technology is used to actively attract attacks, monitor and track attackers, and record the relevant actions so that the attacking tools and tactics used by the intruders can be analyzed and studied. Firstly, the basic definition of Virtual Honey-pot Technology is introduced. Then, the applications of Virtual Honey-pot Technology to network security are systematically studied with three aspects of applied instances, which proves that the Virtual Honey-pot Technology can effectively gather information about attacks and protect the real network. Finally, the advantages and the risks of Virtual Honey -pot Technology are discussed.
作者 翟继强
出处 《中国安全科学学报》 CAS CSCD 2008年第12期106-111,共6页 China Safety Science Journal
基金 哈尔滨市科技创新人才研究专项资金资助(2008RFQXG066)
关键词 网络安全 虚拟蜜罐 入侵检测 蠕虫病毒 虚拟网络 network security virtual honey-pot detection of intrusion worm virus virtual network
  • 相关文献

参考文献10

二级参考文献38

共引文献76

同被引文献36

  • 1秦福建.浅谈网络安全及其防范措施[J].渝西学院学报(自然科学版),2004,3(4):48-51. 被引量:3
  • 2范春风.浅析“僵尸网络”[J].大学时代(B版),2006(2):66-67. 被引量:6
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4李跃贞.基于“蜜罐”技术(Honeypot)的网络信息安全研究[J].中国安全科学学报,2006,16(7):118-121. 被引量:10
  • 5国家计算机网络应急技术处理协调中心.CNCERT/CC2004年网络安全工作报告[EB].http://www.eert.org.cn/upload/2004CNCERTCCAnnualReport-Chinese.pdf,2005-03-28.
  • 6Symantec Inc. Symantec Internet security threat report: Trends for July 06 -December 06. Volume XI. 2007[EB].http://eval symantec, com/mktginfo/enterprise/white_papers/ent - whitepaper_symantec_internet security_threat_report x 09 2006. en - us. pdf, 2008 -01 - 19.
  • 7郑颂武,钱步仁.IRC僵尸内络检测方法研究[EB].http://www.autocontrol.com.cn/magazine/ans/Article,2009-05-02.
  • 8The Honeynet Project and The Honeynet Research Alliace, Know your Enemy: Tracking Botnets, Using honeynets to leara more about Bots, The Honeynet Project Whitepaper [EB]. http ://www. honeynet. org/papers/bots/, 2005 - 03 - 28.
  • 9Holz T. A short visit to the bot zoo[J]. IEEE Security & Privacy, 2005,3(3) :76 -79.
  • 10Karasaridis A, Rexroad B, Hoeflin D. Wide - Scale botnet detection and characterization. In : Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007 ). 2007 [EB]. http://portal, acre. org/citation. cfm? id = 1323128.1323135 &coil = GUIDE&dl = GUIDE&CFID = 16751383 &CFTOKEN = 82837820,2008 - 12 - 01.

引证文献4

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部