期刊文献+

虚拟蜜网核心功能剖析与实例部署 被引量:6

Core Functions Analysis and Example Deployment of Virtual Honeynet
在线阅读 下载PDF
导出
摘要 传统蜜网硬件利用率低、配置复杂、管理难度大等缺点日渐凸显,如何解决这些问题越来越受到研究人员的关注。针对蜜网当前面临的问题,提出了使用虚拟技术构建蜜网的必要性。通过对蜜网关键技术的研究,分析并给出蜜网核心功能在虚拟系统中的工作流程,在此基础上设计并实现了一种虚拟蜜网的解决方案。实验结果表明,建立的虚拟蜜网工作良好,并在一定程度上解决了传统蜜网在硬件利用率、配置和管理等方面存在的问题。 As conventional honeynet's low hardware utilization, complex configuration and difficult management are increasingly appearing,how to solve these problems has been getting more and more researcher's attention. Aiming at the problems that honeynet currently is facing, the paper proposed the necessity of using virtual technology to construct ho- neynet. Through the studying on core functions of honeynet, the paper analyzed and provided the workflow of core func- tions in virtual systerm. Based on that, we designed and implemented a proposal of the virtual honeynet. The results show that the established virtual honeynet works well and solves the shortcomings of conventional honeynet in a certain extent.
出处 《计算机科学》 CSCD 北大核心 2012年第3期101-103,109,共4页 Computer Science
基金 国家科技支撑计划项目(2008BAH37B05) 国家自然科学基金项目(61070162) 国家863计划项目(2007AA041201) 国家CNGI专项(CNGI2008-123)资助
关键词 蜜网 虚拟技术 功能分析 解决方案 Honeynet, Virtual technology, Functions analysis, Proposal
  • 相关文献

参考文献11

  • 1Project H. Know Your Enemy: Honeynets [EB/OL]. http:// old. honeynet, org/papers/honeynet/, 2006-05-31.
  • 2Jason Chang C-H, Tsai Y-L. Design of Virtual Honeynet Collaboration System in Existing Security Research Networks[C]// Communications and Information Technologies. Tokyo, 2010: 798-803.
  • 3Project H, Alliance R. Know Your Enemy: Honeywall CDROM Roo [EB/OL]. http://old, honeynet, org/papers/cdrom/roo, 2005-08-17.
  • 4Shuja F A. Virtual Honeynet: Deploying Honeywall Using Vmware[EB/OL]. http://vcww, honeynet, pk/honeywall/index. html, 2008-06.
  • 5诸葛建伟.蜜罐及蜜网技术简介[EB/OL].2004.http://www.honeynet.org.cn/reporta/蜜罐及蜜网技术简介.
  • 6Abbasi F H, Harris R J. Experiences with a Generation III Virtual Honeynet[C]//Telecommunication Networks and Applications Conference. Canberra, 2009 : 1-6.
  • 7北京大学计算机科学技术研究所Artemis项目组.基于Vmware-Workstation的虚拟Honeynet的部署实例[EB/OL].http://www.icst.pku.edu.cn/honeynetweb/,2005-04-18.
  • 8Domseif M, Freiling F C, Gedicke N, et al. Design and Implementation of the Honey-DVD [C] // Information Assurance Workshop. New York, 2006 : 231-238.
  • 9孙印杰,王敏,陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,18(7):129-132. 被引量:8
  • 10Mware V. Workstation User' s Manual[EB/OL]. http://communities, vmware. com/docs/DOC-12156/version. 2010-05.

二级参考文献13

  • 1诸葛建伟,张芳芳,吴智发.撒下蜜网,研究黑客[J].网上俱乐部(电脑安全专家),2005(7):21-23. 被引量:1
  • 2刘彦保.入侵诱骗技术分析及其模型建立[J].河南科学,2006,24(4):532-535. 被引量:2
  • 3Spitzner L.Honeyptos:Definitions and Value of Honeyptos[Z].2003-05.www tracking-hackers.com.
  • 4Honeynet Project.Know Your Enemy:Honeynets[Z].2003-11.www.honeynet.org.
  • 5Honeynet Project.Know Your Enemy:Genll Honeynet.[Z].2003-11.www.honeynet.org.
  • 6Honeynet Project.Know Your Enemy:Honeywall CDROM[Z].2003-05.www.honeynet.org.
  • 7杨沙州.Linux Netfilter 实现机制和扩展技术[Z].2003-10.www-900.ibm.com/developerWorks/cn/linux/.
  • 8Rob McMillen.Rc.firewall[Z].2002-04.www.honeynet.org/tools/dcontrol/.
  • 9Martin Roesch.Snort Users Manual[Z].2002-04.www.snort.ort.
  • 10Honeynet Project.Snort_inline.conf[Z].2003-12.www.honeynet.ore/tools/.

共引文献15

同被引文献32

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部