首页 | 本学科首页   官方微博 | 高级检索  
     

利用蜜罐技术捕捉来自内部的威胁
引用本文:应锦鑫,曹元大. 利用蜜罐技术捕捉来自内部的威胁[J]. 网络安全技术与应用, 2005, 0(1): 37-39
作者姓名:应锦鑫  曹元大
作者单位:北京理工大学计算机科学工程系,北京,100081
摘    要:近几年来人们对蜜罐技术进行了广泛的研究,但对蜜罐的研究主要集中在对来自网络外部威胁的检测与信息收集,很少有利用蜜罐对来自内网的威胁研究。本文论述了如何利用蜜罐技术来检测、标识及收集来自内部威胁的信息。

关 键 词:蜜罐  蜜网  蜂蜜信标  网络安全

How to Use Honeypots to Catch the Insider Threats
Ying Jinxin Cao YuandaBeijing Institute of Technology,Dept. of Computer Science,Beijing. How to Use Honeypots to Catch the Insider Threats[J]. Net Security Technologies and Application, 2005, 0(1): 37-39
Authors:Ying Jinxin Cao YuandaBeijing Institute of Technology  Dept. of Computer Science  Beijing
Affiliation:Ying Jinxin Cao YuandaBeijing Institute of Technology,Dept. of Computer Science,Beijing 10081
Abstract:In the past several years there has been extensive research into honeypot technologies, but the researchmainly focus detection and information gathering against external threats. However, there is little research into themost dangerous insider threats. This presentation discusses how honeypot technologies can be used to detect,identify, and gather information on the insider threats.
Keywords:Honeypot  Honeynet  Honeytoken  Network security  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号