期刊文献+

客户端蜜罐原理及应用研究 被引量:3

Client Honeypot Principle and Application Research
原文传递
导出
摘要 文章阐述了用于检测客户端攻击的客户端蜜罐系统原理,并对两类以交互级别区分的客户端蜜罐进行了分析比较。同时,文章还深入分析了代码混淆、url重定向、页面隐藏等技术对客户端蜜罐应用产生的影响以及客户端蜜罐可以采取的相应对策。最后,文章提出了一种可以提高检测效率以及准确率的改进的应用策略。 This paper describes the principle of Client Honeypot system, which is used to detect Clientside attack, analyzes and compares two kinds of Client Honeypot categorized by interaction level. Also, this paper gives an in-depth analysis of influences on the application of Client Honeypot posed by several techniques such as code obfuscation, URL redirection, page cloacking, etc. Meanwhile, the counteractions of Client Honeypot towards these techniques are also presented. Finally, the paper suggests a more efficient and accurate application policy by Client Honeypot.
作者 樊迅 王轶骏
出处 《信息安全与通信保密》 2009年第3期69-71,共3页 Information Security and Communications Privacy
关键词 客户端攻击 客户端蜜罐 clientside attack client honeypot
  • 相关文献

参考文献9

  • 1Seifert C,Steenson R,Holz T,et al.Know Your Enemy:Malicious Web Servers[M].The Honeynet Project,2007.
  • 2Niels Provos.A Virtual Honeypot Framework[C].13th USENIX Security Symposium,San Diego,CA,August 2004.
  • 3Honeynet Project & Research Alliance.Know Your Enemy:Honeywall CDROM Roo[DB/OL].August,2005.http://www.honeynet.org/papers/cdrom/roo/index.html.
  • 4Seifert C,Welch I,Komisarczuk P.HoneyC-The Low-Interaction Client Honeypot[C].Proceedings ofthe 2007 NZCSRCS,Waikato University,Hamilton,New Zealand,April 2007.
  • 5The MITRE Honeyclient Project Team.Honeyclient Project Wiki[DB/OL].Jul,2007.http://www.honeyclient.org/trac/wiki.
  • 6Wang Y.-M.,Beck D,Jiang X,et al.Automated Web Patrol with Strider HoneyMonkeys:Finding Web Sites That Exploit Browser Vulnerabilities[C].In 13th Annual Network and Distributed System Security Symposium(San Diego,2006).
  • 7Steenson R,Seifert C.Capture Client Honeypot[DB/OL].Apt,2008.https://projects.honeynet.org/capture-hpc.
  • 8Moshchuk A,Bragin T,Gribble D S,et al.A Crawler-based Study of Spyware on the Web[C].In Proceedings of the 2006 Network and Distributed System Security Symposium,2006:17-33.
  • 9Niu Y,Wang M Y,Chen H,et al.A Quantitative Study of Forum Spamming Using Context-based Analysis[C].in Proc.Network and Distributed System Security Symposium,2007.

同被引文献16

  • 1蒋欣,薛质.针对Honeypot的指纹识别及其防御对策[J].信息安全与通信保密,2005,27(10):79-82. 被引量:4
  • 2刘敬轩,戴英侠.基于NDIS的IPSec VPN客户端的设计与实现[J].信息安全与通信保密,2006,28(12):191-194. 被引量:3
  • 3葛先军,李志勇,宋巍巍.基于网页恶意脚本链接分析的木马检测技术[C]//容错计算专业委员会.第五届中国测试学术会议论文集.上海:中国计算机学会,2008:469-473.
  • 4Ali Ikinci, Thorsten Holz, Felix Freiling. Monkey- Spider: Detecting Malicious Websites with Low- Interaction HoneyClients[C]//Gesellschaft fur Informatik. Proceedings of Sicherheit. Mannheim: University Mannheim, 2008: 233-244.
  • 5Piotr Kijewski. Carol Overes, Rogier Spoor, HoneySpoder Network Fighting Client Side Threat[EB/OL]. (2007-10-12)[2009-05-08]. http:// www. terena. org/activities/tf-csirt/meeting25/overeshoneyspider.pdf.
  • 6Jose Nazario. PhoneyC: A Virtual Client Honeypot[EB/OL]. (2008-03-26)[2009-04-07]. http: // www. usenix.org/event/leet09/tech/full_papers/ nazario/nazario. pdf.
  • 7HOLUND Greg, BUTLER James. Rootkit: Subverting the Windows Kernel[M]. [s.l.]: Addison Wesley Professional, 2006." 281-344.
  • 8BAISHAKHI Ray, SHIVAKANT Mishra. Secure and Reliable Covert Channel[C]//ACM. Proceedings of The 4th Annual Workshop on Cyber Security and Information Intelligence Research. New York : ACM Publications, 2008 : 01-03.
  • 9张帆,史彩成.驱动开发技术详解[M].北京:电子工业出版社,2009:506-520.
  • 10STEENSON R, SEIFERT C. Capture Client Honeypot[DB/OL]. (2007-09-22) [2008-04-05]. https: //projects.honeynet.org/capture-hpc.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部