首页 | 本学科首页   官方微博 | 高级检索  
     

蜜罐技术研究与应用进展
引用本文:诸葛建伟,唐勇,韩心慧,段海新.蜜罐技术研究与应用进展[J].软件学报,2013,24(4):825-842.
作者姓名:诸葛建伟  唐勇  韩心慧  段海新
作者单位:1. 清华信息科学与技术国家实验室(清华大学),北京 100084;清华大学网络科学与网络空间研究院,北京100084
2. 国防科学技术大学计算机学院,湖南长沙,410073
3. 北京大学计算机科学技术研究所,北京,100871
基金项目:国家自然科学基金,国家重点基础研究发展计划(973),国家242信息安全计划
摘    要:蜜罐是防御方为了改变网络攻防博弈不对称局面而引入的一种主动防御技术,通过部署没有业务用途的安全资源,诱骗攻击者对其进行非法使用,从而对攻击行为进行捕获和分析,了解攻击工具与方法,推测攻击意图和动机.蜜罐技术赢得了安全社区的持续关注,得到了长足发展与广泛应用,并已成为互联网安全威胁监测与分析的一种主要技术手段.介绍了蜜罐技术的起源与发展演化过程,全面分析了蜜罐技术关键机制的研究现状,回顾了蜜罐部署结构的发展过程,并归纳总结了蜜罐技术在互联网安全威胁监测、分析与防范等方向上的最新应用成果.最后,对蜜罐技术存在的问题、发展趋势与进一步研究方向进行了讨论.

关 键 词:网络安全  蜜罐  蜜网  蜜场  威胁监测  恶意代码
收稿时间:2012/2/12 0:00:00
修稿时间:2012/12/27 0:00:00

Honeypot Technology Research and Application
ZHUGE Jian-Wei,TANG Yong,HAN Xin-Hui and DUAN Hai-Xin.Honeypot Technology Research and Application[J].Journal of Software,2013,24(4):825-842.
Authors:ZHUGE Jian-Wei  TANG Yong  HAN Xin-Hui and DUAN Hai-Xin
Affiliation:Tsinghua National Laboratory for Information Science and Technology (Tsinghua University), Beijing 100084, China;Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China;School of Computer Science, National University of Defense Technology, Changsha 410073, China;Institute of Computer Science and Technology, Peking University, Beijing 100871, China;Tsinghua National Laboratory for Information Science and Technology (Tsinghua University), Beijing 100084, China;Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Abstract:Honeypot is a proactive defense technology, introduced by the defense side to change the asymmetric situation of a network attack and defensive game. Through the deployment of the honeypots, i.e. security resources without any production purpose, the defenders can deceive attackers to illegally take advantage of the honeypots and capture and analyze the attack behaviors to understand the attack tools and methods, and to learn the intentions and motivations. Honeypot technology has won the sustained attention of the security community to make considerable progress and get wide application, and has become one of the main technical means of the Internet security threat monitoring and analysis. In this paper, the origin and evolution process of the honeypot technology are presented first. Next, the key mechanisms of honeypot technology are comprehensively analyzed, the development process of the honeypot deployment structure is also reviewed, and the latest applications of honeypot technology in the directions of Internet security threat monitoring, analysis and prevention are summarized. Finally, the problems of honeypot technology, development trends and further research directions are discussed.
Keywords:network security  honeypot  honeynet  honeyfarm  threat measurement  malware
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号