期刊文献+

基于LKM的无线蜜罐实现技术研究

Wireless Honeypot implementation technology based on LKM
下载PDF
导出
摘要 为降低真实AP被探测攻击的概率及实现对探测攻击行为进行跟踪研究,提出了一种基于可加载内核模块LKM与无线网卡驱动MadWiFi的无线接入点蜜罐实现技术,随机生成大量的虚假无线接入点并响应连接探测,同时对探测攻击行为进行跟踪分析。实验结果表明该无线蜜罐实现技术达到了预期效果。 For reducing the probability of real APs being attacked, and tracking and studying the action which probing and attacking real APs, the paper presented a Wireless Honeypot implementation technology. It based on LKM technology with wireless network card driver MadWiFi to build a wireless honeypot platform that could deceive attackers by generating a large number of faked wireless APs to reply probing access. It also could track and analyze activities of attackers. The result of the experiment shows this implementation technology can meet the requirements of the honeypot system.
出处 《计算机应用研究》 CSCD 北大核心 2009年第9期3516-3518,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60503008)
关键词 无线蜜罐 MadWiFi 接入点 LKM Wireless Honeypot MadWiFi access point(AP) LKM
  • 相关文献

参考文献13

  • 1郭长庚,连智锋.无线模拟AP的安全模型设计[J].微计算机信息,2007,23(04X):64-66. 被引量:2
  • 2OUDOT L. Wireless Honeypot countermeasures[ EB/OL]. (2004-02- 13 ) [ 2007-12-10 ]. http ://www. securityfocus, com/infocus/1761.
  • 3SPITZNERL.Honeypot:追踪黑客[M].邓云佳,译.北京:清华大学出版社,2004.
  • 4唐勇,卢锡城,胡华平,朱培栋.Honeypot技术及其应用研究综述[J].小型微型计算机系统,2007,28(8):1345-1351. 被引量:9
  • 5Honeyd project [ EB/OL]. http ://www. honeyd, org.
  • 6BlackAlchemy. FakeAP [ EB/OL ]. http ://www. blackalchemy, to/project/fakeap/.
  • 7802.11Honeypot [ EB/OL]. (2006). http ://www. loud-fat-bloke, co. uk/artieles/whoneypot, pdf.
  • 8HoneySpot [ EB/OL]. (2008). http://honeynet, org. es/? p = 41 &language = en.
  • 9李娟,薛质.利用无线蜜罐实施纵深欺骗[J].信息安全与通信保密,2007,29(6):126-128. 被引量:1
  • 10YEK S. Implementing network defence using deception in wireless honeypot [ C ]//Proc of the 2rid Australian Computer Network Information and Forensics Conference. [ S. 1. ] : Edith Cowom University, 2004.

二级参考文献82

  • 1祝木田,师勇.ModBUS协议通讯的应用[J].微计算机信息,2004,20(6):9-11. 被引量:47
  • 2唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 3[1]Deraison R.Nessus(version2.0).Network vulnerability scanner.2003b.
  • 4[2]Deraison R.Nessus introductions,Retrieved 12,Oct,2003,http://www.nessus.org/intro,html.2003b
  • 5[3]Noordergraaf A.How Hackers Do It:Tricks,Tools,Techniques,Retrieved 20,Oct2003.
  • 6[4]Webb,S(2003) Identifying trends in 802.1 lb networks in perth.
  • 7[5]Fyodor.(2003b)Nmap:Network Mappers (Version 3.48)[Network exploration tool and security scanner].
  • 8[6]Brett Neilson (2004) Wireless Security.
  • 9[7]Lok Kwong Yan,(2005)IEEE,Virtual Honeynets Revisited.
  • 10[8]Sue Yek.(2004)Implementing network defence using deception in wireless honeypot.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部