期刊文献+

网络入侵诱骗技术Honeypot系统的研究与实现

Research on Network Security Based on Intrusion Detection and Deception Technique as Honeypot System
下载PDF
导出
摘要 在介绍防火墙技术和入侵检测的基础上,分析了网络入侵诱骗技术Honeypot的3种主要技术:IP欺骗技术、重定向型诱骗、网络动态配置。探讨了通过虚拟机软件模拟网络服务实现诱骗环境的方法及系统设计。基于诱骗技术的网络安全系统是入侵检测的扩充,是网络安全技术中的一个新的研究领域,具有广阔的应用前景。 Based on introducing Firewall and Intrusion Detection System (IDS), this article analyses three main network intrusion deception techniques-lP Trap technique,redirection deception and dynamic configuring network. It discusses technique that simulating network service realizes deception environment with virtual machine software and system design. On the basis of inveigle technology of network security system is the expansion of intrusion detection and a new research field on the network security techniques, and it has wide application prospects.
出处 《电脑与电信》 2008年第2期18-19,共2页 Computer & Telecommunication
关键词 网络安全 入侵检测 诱骗环境 HONEYPOT Network Security Intrusion Detection Deception Environment Honeypot
  • 相关文献

参考文献5

二级参考文献26

  • 1刘小杨,房至一,翟羽佳,袁龙略.用Honeypot改善NIDS性能[J].吉林大学学报(理学版),2006,44(1):67-72. 被引量:3
  • 2宋如顺 钱刚 陈波.网络系统安全技术[M].南京:东南大学出版社,2000..
  • 3Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 4Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 5Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 6Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 7Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.
  • 8Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.
  • 9Kahn C, Porras P, Staniford-Chen, et al. A common intrusion detection framework[EB/OL]. 1998. http:/www.isi.edu/gost/cidf/papers/cidf-jcs.ps.
  • 10Teng H S, Chen K, Lu S C. Security audit trail analysis using inductively generated predictive rules[A]. Proceeding of the Sixth Conference on Artificial Intelligence Applications[C]. Los Alamitos, USA: IEEE Computer Society Press, 1990. 24-29.

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部