期刊文献+

面向蜜场环境的网络攻击流重定向机制的研究与实现 被引量:9

Research and Implementation of Network Attack Flow Redirection Mechanism in the Honeyfarm Environment
在线阅读 下载PDF
导出
摘要 网络攻击流重定向是蜜场中的关键技术之一。文中对其机制进行了研究,提出了基于网络环境信息自动感知技术与入侵检测技术相结合的网络攻击检测机制,以及基于OpenVPN与策略路由的透明网络流重定向机制,并实现了一个基于上述机制的网络攻击流重定向系统,最后通过实验验证了系统的有效性。 Network attack flow redirection is a key technology in honeyfarm, this paper focuses on the research of its mechanism. We propose a mechanism to detect network attack, based on the combination of the network environment information auto-apperceiving technology and the intrusion detection technology, and present annother mechanism of network flow transparent redirection based on OpenVPN and strategy routing. Moreover, a network attack flow redirection system based on the proposed mechanism is accom-plished. Finally, some experiments are performed and the results verify the effectiveness of the system.
出处 《南京邮电大学学报(自然科学版)》 2009年第3期14-20,共7页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家高技术研究发展计划(863计划)(2006AA01Z445) 高等学校博士学科点专项科研基金(200800011019)资助项目
关键词 网络流重定向 非业务访问 网络环境信息自动感知 蜜场 蜜罐 network flow redirection non-service visit network environment information auto-apperceiring honeyfarm honeypot
  • 相关文献

参考文献13

  • 1SPITZNER L.Honeypots[EB/OL].http://www.tracking-hackers.com/papers/honeypots.html.
  • 2ZHOU Y L,ZHUGE G W,XU N,et al.Matrix,a distributed honeynet and its applications[C]// Proceedings of 20th Annual FIRST Conference (FIRST'08).[S.l.]:[s.n.],Jun 2008.
  • 3SPITZNER L.Honeypot Farms[EB/OL].http://www.securityfocus.com/infocus/1720.
  • 4HOSNER C.OpenVPN and the SSL VPN Revolution[EB/OL].http://www.sans.org/reading_room/whitepapers/vpns/1459.php.
  • 5The NoAH project[EB/OL].http://www.fp6-noah.org.
  • 6ANTONATOS S,MARKATOS E P,ANAGNOSTAKLS K G.Honey@home:A new approach to largescale threat monitoring[C]///Proceedings of the 2007 ACM Workshop on Recurring Malcode (WORM'07).Piscataway:IEEE,2007.
  • 7FYODOB.Nmap:Free security scanner for network exploration & security audits[EB/OL].http://www.insecure.org/nmap/.
  • 8Tenable Network Security.Nessus open source network vulnerability scan tool[EB/OL].http://www.nessus.org/.
  • 9SHELTON M.PADS:Passive asset detection system[EB/OL].http://passive.sourceforge.net/.
  • 10ZALEWSKI M.Passive OS fingerprinting tool[EB/OL].http://lcamtuf.coredump.cx/p0f.shtml.

同被引文献29

引证文献9

二级引证文献114

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部