期刊文献+

基于linux的虚拟蜜罐系统的实现 被引量:1

Virtual honeypot system Implementation based on linux
在线阅读 下载PDF
导出
摘要 蜜罐(又称为黑客诱骗技术)是基于主动防御理论而提出来的,在监测入侵、保护客体、信息反馈、提高反击入侵能力的网络安全系统中,日益受到重视。本文针对HONEYD能在一台物理机器上创建大量的虚拟蜜罐,从逻辑结构、不同网络数据包的处理、通过脚本语言的实现等分析了在linux环境下创建虚拟蜜罐的方法和步骤。 Honeypot(also known as hackers lure technology) initiative is based on the Active defense theory,and it received increasing attention in monitoring the invasion, the protection of objects, information feedback and improve the ability to counter the invasion of network security systems.This paper in connection with that Honeyd can create a large number of virtual honeypot in one physical machine,Analyzes how to create virtual honeypot based on linux from the logical structure, the different network packet processing, and the realization of the scripting language.
出处 《微计算机信息》 2010年第9期70-72,共3页 Control & Automation
关键词 蜜罐 虚拟蜜罐 HONEYD honeypot virtual honeypot honeyd
  • 相关文献

参考文献5

  • 1The development of HONEYD.org.www.http://www.HONEYD.org.
  • 2胡文,黄皓.蜜罐重定向机制的设计与实现[J].微计算机信息,2006(01X):27-29. 被引量:11
  • 3The introduction of NMAP security scanner [EB/OL]. http://www.nmap.org.
  • 4Kevin Fall. Network Emulation in the VINT/NS Simulator. In Proceedings of the fourth IEEE Symposium on Computers and Communications, July 1999.
  • 5Niels Provos. A Virtual Honeypot Framework. Google,Inc.

二级参考文献4

  • 1刘喜龙,石中锁.基于H264的嵌入式视频服务器的设计[J].微计算机信息,2005,21(1):133-134. 被引量:39
  • 2L. Spitzner, "Honeypot-Definitions and Value of Honeypots", 2003.http://www.tracking-hackers.conrtpapers/honeypots.html
  • 3Richard La Bella, "Genii Data Control for Honeynets: Understanding and Building Snort-Inline Data Control", February, 2003. http://www.infosecwriters.eom/texts.php?op=display&id=64
  • 4Kirby Kuehl, "Honeynets: Detecting Insider Threats", Honeynet Project,AusCERT2004, 26th May 2004. http://winfingerprint.sourceforge.net/presentations/honeynet-insider-threat-2004.ppt&e=747.

共引文献10

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部