期刊文献+

基于两级重定向机制的密网研究和设计 被引量:1

Research and Design about Honeynet Based on Two-level Redirect Mechanism
在线阅读 下载PDF
导出
摘要 针对当前密网部署中存在两个不足之处:一是如果黑客知道密网的存在,从而绕开它去攻击非密网主机,这样密网存在就没有价值;二是如果黑客利用攻陷的蜜罐去攻击外网主机,现在流行的办法采取密网网关来简单限制外出连接数,这存在两个致命的弱点:(1)少量的外出连接有可能造成危害,蜜罐被人误认为攻击者;(2)黑客知道自己被限制向外连接,那么密网就可能被暴露,更有可能利用错误消息迷惑密网部署者。文中提出两级重定向机制来弥补这两个不足之处。第一级重定向机制在非密网主机设置使对其攻击流定向到密网,第二级重定向机制把从蜜罐出去的攻击流定向到其它蜜罐。通过文中建立的模拟密网很好地实现了这两种机制,实验证明基于两级重定向机制的密网可以起到保护非密网主机的作用,限制对外入侵,同时能让黑客感觉不到它的存在。 There are two defects in the current hone)net deployment. Firstly, if the hackers know of the existence of hone)net, thus bypassing it to attack non- honeynet host, so there will be no value;secondly, if hackers use compromised honeypot to attack the non- honeynet host, now popular way is taking network gateway simply to restrict connect on the number, there are two fatal weaknesses: ( 1 ) outside connections probably cause harm and honeypot maybe be mistaken for attackers; (2) hackers know that they were restricted from outside connections, then the hone)net could be exposed, are more likely to use error messages to confuse honey'net deployer. Therefore recommand two - level redirect mechanisms can make up for deficiencies. First - layer redirect mechanism by setting up non - honeynet host to redirect attack stream to honeynet, the second - layer mechanism redirect attack stream from a honeypot to another honeypot.
出处 《计算机技术与发展》 2009年第5期158-161,共4页 Computer Technology and Development
基金 国家自然科学基金(60671049)
关键词 蜜罐 重定向 密网 两级 honeypot redirect honeynet two - level
  • 相关文献

参考文献8

  • 1孙印杰,王敏,陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,18(7):129-132. 被引量:8
  • 2郭文举.反蜜罐技术的研究和实践[D/DB]中国优秀硕士学位论文全文数据库.,2005.
  • 3Spitzner L. Honeypot - Definition sand value of honeypots [EB/OL]. 2003. http://www.tracking- hackers, com/papers/honeypots.html.
  • 4刘小杨,房至一,翟羽佳,袁龙略.用Honeypot改善NIDS性能[J].吉林大学学报(理学版),2006,44(1):67-72. 被引量:3
  • 5www. honeynet, org.. know your enemy[EB/OL]. 2006. http;//www, honeynet. 0rg/papers/honeynet/index. html.
  • 6Spitzner L. Honeypots: Tracking Hackers[ M]. America: Addison- Wesley Readings, 2004.
  • 7Suehring S.Linux Firewalls:linux防火墙[M].何泾沙译.北京:机械工业出版社,2004:41-46,50-51.
  • 8周华平.防火墙中规则的翻译及检测方法的研究[J].计算机技术与发展,2007,17(11):135-138. 被引量:2

二级参考文献14

  • 1房至一,黄孟陬,张震.基于集中控制的Web Cache体系结构[J].吉林大学学报(理学版),2004,42(3):387-392. 被引量:1
  • 2诸葛建伟,张芳芳,吴智发.撒下蜜网,研究黑客[J].网上俱乐部(电脑安全专家),2005(7):21-23. 被引量:1
  • 3刘彦保.入侵诱骗技术分析及其模型建立[J].河南科学,2006,24(4):532-535. 被引量:2
  • 4Baratloo A, Singh N, Tsai T. Transparent Run-time Defense against Statck Smashing Attacks [ C/OL]//Proceedings ofthe 2000 USENIX Annum Technical Conference. [ 2004-07-13 ]. http ://www. research. avayalabs. com/project/libsafe/doc/usenix00/paper. html.
  • 5Northcutt S 陈曙辉 李化 译.深入剖析网络边界安全[M].北京:机械工业出版社,2003..
  • 6Baumann R, Plattner C. White Paper: Honeypots [ M/OL]. [ 2002-02-26 ]. http ://www. inf. ethz. ch/personal/plattner/pdf/whitepaper. pdf.
  • 7Heberlein L. A Network Security Monitor [ C]//Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990: 296-303.
  • 8Desai N. Increasing Performance in High Speed NIDS: a Look at Snort's Internals [ M/OL]. [2004-06-13 ].http ://www. linuxsecurity. com/aricles/intrusion_detection-4617. html.
  • 9陈健明.VC++6.0实现JNI[M/OL].http://gceclub.sun.com.cn/yuanchuang/week-15/jni.html,2005-01-21.
  • 10CALLAN R.人工智能[M].黄厚宽,译.北京:电子工业出版社,2004.

共引文献10

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部