首页 | 本学科首页   官方微博 | 高级检索  
     

蜜罐技术在网络安全系统中的应用与研究
引用本文:孙中廷. 蜜罐技术在网络安全系统中的应用与研究[J]. 计算机与网络, 2014, 0(17): 69-72
作者姓名:孙中廷
作者单位:江苏联合职业技术学院徐州机电工程分院,江苏徐州221011
摘    要:随着网络技术的不断发展,网络安全技术已经从早期对攻击和病毒的被动防御开始向对攻击者进行欺骗并且对其入侵行为进行监测的方向发展。基于蜜罐技术的网络安全系统可以实现对内部网络和信息的保护,并且可以对攻击行为进行分析和取证。文中对蜜罐系统分类特点、部署位置以及配置数量进行了分析,同时对蜜罐系统中关键部分取证服务器的实现进行了研究,并进行了实验测试,测试结果表明该蜜罐系统可以实现对攻击行为进行捕捉和记录的功能。对蜜罐系统的部署和保护模式进行研究,可以从理论上优化蜜罐系统的配置和部署,具有很高的实践意义。

关 键 词:蜜罐技术  网络欺骗  网络安全  入侵检测  交互性分析

Application and Research of Honeypot Technology in Network Security System
SUN Zhong-ting. Application and Research of Honeypot Technology in Network Security System[J]. China Computer & Network, 2014, 0(17): 69-72
Authors:SUN Zhong-ting
Affiliation:SUN Zhong-ting (Department of Xuzhou Electromedchanical Engineering, Jiangsu United Vocational College, Xuzhou Jiangsu 221011, China)
Abstract:With the continuous development of network technology the network security technology develops from the early passive defense of attacks and viruses towards the direction of deception of attacker and monitoring of intrusion behavior. The network security system based on honeypot technology can protect the internal network and?information and analyze and take the evidence of attack behavior. This paper analyzes the classification characteristics, deployment location and allocation number of honeypot system, studies the implementation of key part of evidence server in honeypot system, and carries out the experimental testing. The testing results show that the honeypot system can implment the capture and record functions of attack behavior. The research on deployment and protected mode of honeypot system can theoretically optimize the configuration and deployment of honeypot system, and has high practical significance.
Keywords:honeypot technology  network spoofing  network security  intrusion detection  interactivity analysis
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号