期刊文献+

一种基于拟态防御机制的SDN虚拟蜜网 被引量:5

SDN Virtual Honeynet Based on Mimic Defense Mechanism
下载PDF
导出
摘要 针对传统蜜网部署不方便,流量控制困难,蜜网动态调整较复杂的缺陷,利用SDN技术灵活的控制机制与容器高速、轻量的技术特性,设计了具有动态可调整特性的SDN虚拟蜜网,结合拟态防御机制为SDN虚拟蜜网提供动态调整的依据,并通过博弈论验证了基于拟态防御机制的SDN虚拟蜜网的有效性。利用Containernet仿真实验平台搭建出SDN虚拟蜜网,并设计实现了基于拟态防御机制的动态跳变,通过实验验证了该蜜网的可行性。 The traditional honeynet has many drawbacks such as inconvenient deployment, difficult flow control and complex dynamic adjustment. SDN technology has flexible controlling mechanism and container with high speed and lightweight. A SDN virtual honeynet is designed by using these advantages. It will provide dynamic adjustment basis to SDN virtual honeynet by using the mimic defense mechanism. The effectiveness of the SDN virtual honeynet is verified based on the game theory. At last, the SDN virtual honeynet is established using Containernet simulation platform, and the dynamic jumping change is designed and implemented based on mimic defense mechanism. The feasibility of the honeynet is verified through experiments.
作者 廉哲 殷肖川 席茜 谭韧 LIAN Zhe;YIN Xiaochuan;XI Xi;TAN Ren(Information and Navigation College,Air Force Engineering University,Xi’an 710077,China)
出处 《计算机工程与应用》 CSCD 北大核心 2019年第1期109-114,共6页 Computer Engineering and Applications
基金 陕西省工业科技攻关项目(No.2016GY-087)
关键词 软件定义网路 拟态防御 容器技术 虚拟蜜网 动态跳变 software defined networking mimic defense container technology virtual honeynet dynamic jump
  • 相关文献

参考文献7

二级参考文献37

  • 1赖积保,王慧强,朱亮.网络安全态势感知模型研究[J].计算机研究与发展,2006,43(z2):456-460. 被引量:12
  • 2程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 3曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 4熊忠阳,郑元兵,张玉芳.基于J2EE的高可用性Web集群的设计及实现[J].计算机工程与设计,2006,27(22):4334-4336. 被引量:3
  • 5BAECHER P, HOLZ T, KOETTER M, et al. Know your enemy: tracking botnets, using honeynets to learn more about bots[EB/OL]. http://www.honeynet.org/papers/ bots/, 2005. Accessed March 2007.
  • 6WATSON D, HOLZ T, MUELLER S. Know your enemy: phishing[EB/OL], http://www.honeynet.org/papers/phishing/,2005. Accessed March 2007.
  • 7PROVOS N. A virtual honeypot framework[A]. Proceedings of 13th USENIX Security Symposium[C]. San Diego, CA, USA, 2004. 1-14.
  • 8BALAS E, VIECCO C. Towards a third generation data capture architecture for honeynets[A]. Proceeedings of the 6th IEEE Information Assurance Workshop[C]. West Point, NY, USA, 2005.
  • 9BAECHER P, KOETTER M, HOLZ T, et al. The nepenthes platform: an efficient approach to collect malware[J]. Lecture Notes in Computer Science 4219, 2006, 165-184.
  • 10ZIMMER D. Multipot[EB/OL]. http://labs.idefense.com/software/malcode. php, 2006. Accessed March 2007.

共引文献290

同被引文献41

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部