首页 | 本学科首页   官方微博 | 高级检索  
     

网络入侵诱骗技术Honeypot系统的研究与实现
引用本文:屠昂燕,陈建成. 网络入侵诱骗技术Honeypot系统的研究与实现[J]. 广东电脑与电讯, 2008, 0(2): 18-19
作者姓名:屠昂燕  陈建成
作者单位:绍兴文理学院计算机系 浙江绍兴312000(屠昂燕),浙江工业职业技术学院计算机系 浙江绍兴312000(陈建成)
摘    要:在介绍防火墙技术和入侵检测的基础上,分析了网络入侵诱骗技术Honeypot的3种主要技术:IP欺骗技术、重定向型诱骗、网络动态配置。探讨了通过虚拟机软件模拟网络服务实现诱骗环境的方法及系统设计。基于诱骗技术的网络安全系统是入侵检测的扩充,是网络安全技术中的一个新的研究领域,具有广阔的应用前景。

关 键 词:网络安全  入侵检测  诱骗环境  Honeypot

Research on Network Security Based on Intrusion Detection and Deception Technique as Honeypot System
Tu Angyan,Chen Jiancheng. Research on Network Security Based on Intrusion Detection and Deception Technique as Honeypot System[J]. Computer & Telecommunication, 2008, 0(2): 18-19
Authors:Tu Angyan  Chen Jiancheng
Affiliation:Tu Angyan , Chen Jiancheng (1. Shaoxing University, Shaoxing 312000, Zhejiang 2. Zhejiang Industry Polytechnic College, Shaoxing 312000, Zhejiang)
Abstract:Based on introducing Firewall and Intrusion Detection System( IDS),this article analyses three main network intrusion deception techniques:IP Trap technique,redirection deception and dynamic configuring network.It discusses technique that simulating network service realizes deception environment with virtual machine software and system design.On the basis of inveigle technology of network security system is the expansion of intrusion detection and a new research field on the network security techniques,and it has wide application prospects.
Keywords:Network Security  Intrusion Detection  Deception Environment  Honeypot
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号