期刊文献+

基于嵌入式环境的Honeyd研究

Study of Honeyd Base on Embedded Environment
下载PDF
导出
摘要 嵌入式系统应用已渗入到工业、军事、日常生活等各个邻域。随着嵌入式系统应用的普遍化和网络技术的不断发展,嵌入式网络应用将成为嵌入式系统应用发展的趋势。嵌入式网络的存在,必须要考虑嵌入式网络安全方面的问题。嵌入式系统本身资源有限,无法存储和运行大型的安全工具等。提出了在嵌入式系统上使用蜜罐Honeyd的安全防御措施。介绍了嵌入式系统安全特点并对Honeyd简单介绍,然后分析Honeyd的体系结构及配置,最后实现在嵌入式设备上对Honeyd的移植并进行测试分析。 With the application of the generalized embedded system and the constantly development of the embedded system technology, network technology and internet technology, networked applications will be embedded application development trend. The existence of embedded network must consider the security aspects of embedded. However, the embedded system itself with the character of limited resources can' t be able to store and operation safety of traditional software such as firewall, intrusion detection, etc. The use of Honeyd safety precautions base on embedded system is proposeds. Characteristics of embedded system safety are introduced and Honeyd simply introduced, and then analysed the system structure and configuration of Honeyd, finally realized transplanted of Honeyd and testing analysis on the embedded environment.
出处 《科学技术与工程》 2010年第4期904-909,共6页 Science Technology and Engineering
关键词 蜜罐 HONEYD 嵌入式网络 安全 Honeypot Honeyd embedded network security
  • 相关文献

参考文献8

  • 1SpitznerL.Honeypots:追踪黑客.邓云佳.译.北京:清华大学出版社,2004.
  • 2颜世峰,栾贵兴,李莉.TCP/IP网络的攻击方式与安全策略[J].小型微型计算机系统,2001,22(7):796-799. 被引量:2
  • 3Provos N. Honeyd-network rhapsody for you. http ://www. citi. umich. edu/u/provos/honeyd/ ,2006.
  • 4Chandran R, Pakala S. Simulating networks with honeyd, http:// www. paladion, net, 2003.
  • 5梁知音.Honeyd软件框架介绍.北京:北京大学计算机科学技术研究所,2004:5-7.
  • 6Provos N. A virtual Honeypot framework, http://www, citi. umich. edu/techreports/reports/citi-tr-03-1, pdf 2003. 2004:5.
  • 7官凌青,娄嘉鹏,刘莉.Honeyd的扩展设计与实现[J].北京电子科技学院学报,2006,14(4):83-85. 被引量:4
  • 8薛强,孙济洲.完善入侵检测蜜罐系统的方法[J].计算机工程,2004,30(15):111-113. 被引量:3

二级参考文献22

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部