期刊文献+

网络诱骗技术

Discussion on the network trap technology
下载PDF
导出
摘要 作为一种新兴的主动防御技术,网络诱骗技术是对传统网络防御手段的有效补充,通过将网络攻击引向伪造的、虚假的信息资源,达到保护网络中真正有价值信息资源的目的.首先阐述了网络诱骗的基本原理和基本要求,并在此基础上介绍了四种实用的网络诱骗技术. As a new active defense techenology, network trap protects the valuable resource of information by guiding the attack to the imitative and illusive information, which is an available makeup of the traditional network defense methods. The basic concepts and requerments of network trap are presented first, and then four useful network trap technologies are introduced.
作者 陈要武
出处 《信息技术》 2010年第6期253-254,共2页 Information Technology
关键词 网络诱骗 蜜罐 蜜网 蜜场 Honeytoken network trap honeypot honeynet honeyfarm honeytoken
  • 相关文献

参考文献6

  • 1John Levine,Richard LaBella.The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks[C] //Proceedings of the 2003 IEEE.Workshop on Information Assurance.United State American:United State Military Academy,2003.
  • 2Sven Kra88er,Julian B Grizzard,Henry L Owen.The Use of Honeynets to Increase Computer Network Security and User Awareness[J].Journal of Security Education,2005.
  • 3张震.入侵诱骗模型的建立方案[J].系统工程与电子技术,2004,26(4):433-436. 被引量:8
  • 4詹珽.陷阱系统的研究与设计[J].贵州工业大学学报(自然科学版),2004,33(6):53-56. 被引量:2
  • 5Spitzner L.Honeypot Farms[EB/OL].[2003-08-13].http://www.securityfocus.com/infocus/1720.
  • 6Spitzner L.Honeypots:Catching the Insider Threat[c].Proceedings of the 19th Annual Computer Security Applications Conference,Las Vegas,Nevada,USA,2003-12-08.

二级参考文献4

  • 1[1]Gary R.Wright,W.Richard Stevens著,陆雪莹等译.tcp/ip详解第二卷[M].北京:机械工业出版社,2000.
  • 2[5]杨学良,等.UNIX SYSTEM V内核剖析[M].北京:电子工业出版社,1990.
  • 3Sipley, Greg. Anatomy of a Network Intrusion [J]. Network Computing,1999,10(21):124.
  • 4David Klug. Honeypot and Intrusion Detection [EB/OL]. URL: http://www.sans.org/infosecFAQ/honeypots.htm., 2000-09-13.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部