期刊文献+

蜜罐识别技术研究

Study on Honeypot Detection Technology
原文传递
导出
摘要 蜜罐技术是一种欺骗入侵者以达到采集黑客攻击方法和保护真实主机目标的诱骗技术,它的核心价值在于被探测、被攻击或者被威胁,以此达到对这些攻击活动的检测与分析,从而了解攻击者的目的、攻击手段甚至于心理习惯,最终实现从观察攻击者的行为中学习到深层次的信息保护的方法。在蜜罐技术的应用过程中,最为关键的一点就是蜜罐系统对攻击者所具有的迷惑性。从蜜罐系统特有的系统特征、硬件特征以及网络特征出发,分析各种蜜罐系统或者虚拟机系统中可能存在的一些可识别的特性,提出一些识别方案并针对部分方法进行了编程识别,希望能够引起安全行业的重视,能够推动蜜罐技术的发展。 Honeypot technology is employed to trap attacks,thus to collect the attack information and protect the real host.The core value of the honeypot lies in being detected,attacked and threatened,with this,the people could analyze the attack,know its attack purpose,means and strategies,and finally learn in-depth information protection methods.In the application of honeypot technology,the most important point is the misleading of the attackers.This paper analyzes the identifiable points of the honeypot and virtual machine systems through several specific characteristics of the system hardware and the network.Then it proposes some solutions to the identification with experimental statistics.It is hoped that the information security industry could attach the importance to and promote the development of honeypot technology.
出处 《信息安全与通信保密》 2011年第5期91-93,共3页 Information Security and Communications Privacy
关键词 蜜罐 虚拟机 探测 识别 honeypot virtual machine detection identification
  • 相关文献

参考文献7

二级参考文献23

  • 1周莲英,曹登元,年轶.虚拟蜜罐系统框Honeyd的分析与研究[J].计算机工程与应用,2005,41(27):137-140. 被引量:18
  • 2蒋欣,薛质.针对Honeypot的指纹识别及其防御对策[J].信息安全与通信保密,2005,27(10):79-82. 被引量:4
  • 3郑君杰,肖军模,刘志华,王晓蕾,王宏涛.基于Honeypot技术的网络入侵检测系统[J].电子科技大学学报,2007,36(2):257-259. 被引量:12
  • 4Seifert C,Steenson R,Holz T,et al.Know Your Enemy:Malicious Web Servers[M].The Honeynet Project,2007.
  • 5Niels Provos.A Virtual Honeypot Framework[C].13th USENIX Security Symposium,San Diego,CA,August 2004.
  • 6Honeynet Project & Research Alliance.Know Your Enemy:Honeywall CDROM Roo[DB/OL].August,2005.http://www.honeynet.org/papers/cdrom/roo/index.html.
  • 7Seifert C,Welch I,Komisarczuk P.HoneyC-The Low-Interaction Client Honeypot[C].Proceedings ofthe 2007 NZCSRCS,Waikato University,Hamilton,New Zealand,April 2007.
  • 8The MITRE Honeyclient Project Team.Honeyclient Project Wiki[DB/OL].Jul,2007.http://www.honeyclient.org/trac/wiki.
  • 9Wang Y.-M.,Beck D,Jiang X,et al.Automated Web Patrol with Strider HoneyMonkeys:Finding Web Sites That Exploit Browser Vulnerabilities[C].In 13th Annual Network and Distributed System Security Symposium(San Diego,2006).
  • 10Steenson R,Seifert C.Capture Client Honeypot[DB/OL].Apt,2008.https://projects.honeynet.org/capture-hpc.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部