期刊文献+

蜜罐技术研究与应用进展 被引量:89

Honeypot Technology Research and Application
在线阅读 下载PDF
导出
摘要 蜜罐是防御方为了改变网络攻防博弈不对称局面而引入的一种主动防御技术,通过部署没有业务用途的安全资源,诱骗攻击者对其进行非法使用,从而对攻击行为进行捕获和分析,了解攻击工具与方法,推测攻击意图和动机.蜜罐技术赢得了安全社区的持续关注,得到了长足发展与广泛应用,并已成为互联网安全威胁监测与分析的一种主要技术手段.介绍了蜜罐技术的起源与发展演化过程,全面分析了蜜罐技术关键机制的研究现状,回顾了蜜罐部署结构的发展过程,并归纳总结了蜜罐技术在互联网安全威胁监测、分析与防范等方向上的最新应用成果.最后,对蜜罐技术存在的问题、发展趋势与进一步研究方向进行了讨论. Honeypot is a proactive defense technology, introduced by the defense side to change the asymmetric situation of a network attack and defensive game. Through the deployment of the honeypots, i.e. security resources without any production purpose, the defenders can deceive attackers to illegally take advantage of the honeypots and capture and analyze the attack behaviors to understand the attack tools and methods, and to learn the intentions and motivations. Honeypot technology has won the sustained attention of the security community to make considerable progress and get wide application, and has become one of the main technical means of the lnternet security threat monitoring and analysis. In this paper, the origin and evolution process of the honeypot technology are presented first. Next, the key mechanisms of honeypot technology are comprehensively analyzed, the development process of the honeypot deployment structure is also reviewed, and the latest applications of honeypot technology in the directions of lnternet security threat monitoring, analysis and prevention arc summarized. Finally, the problems of honeypot technology, development treads and further research directions are discussed.
出处 《软件学报》 EI CSCD 北大核心 2013年第4期825-842,共18页 Journal of Software
基金 国家自然科学基金(61003127 61003303) 国家重点基础研究发展计划(973)(2009CB320505) 国家242信息安全计划(2011A40)
关键词 网络安全 蜜罐 蜜网 蜜场 威胁监测 恶意代码 network security honeypot honeynet honeyfarm threat measurement malware
  • 相关文献

参考文献5

二级参考文献46

  • 1SPITZNER L.Honeypots[EB/OL].http://www.tracking-hackers.com/papers/honeypots.html.
  • 2ZHOU Y L,ZHUGE G W,XU N,et al.Matrix,a distributed honeynet and its applications[C]// Proceedings of 20th Annual FIRST Conference (FIRST'08).[S.l.]:[s.n.],Jun 2008.
  • 3SPITZNER L.Honeypot Farms[EB/OL].http://www.securityfocus.com/infocus/1720.
  • 4HOSNER C.OpenVPN and the SSL VPN Revolution[EB/OL].http://www.sans.org/reading_room/whitepapers/vpns/1459.php.
  • 5The NoAH project[EB/OL].http://www.fp6-noah.org.
  • 6ANTONATOS S,MARKATOS E P,ANAGNOSTAKLS K G.Honey@home:A new approach to largescale threat monitoring[C]///Proceedings of the 2007 ACM Workshop on Recurring Malcode (WORM'07).Piscataway:IEEE,2007.
  • 7FYODOB.Nmap:Free security scanner for network exploration & security audits[EB/OL].http://www.insecure.org/nmap/.
  • 8Tenable Network Security.Nessus open source network vulnerability scan tool[EB/OL].http://www.nessus.org/.
  • 9SHELTON M.PADS:Passive asset detection system[EB/OL].http://passive.sourceforge.net/.
  • 10ZALEWSKI M.Passive OS fingerprinting tool[EB/OL].http://lcamtuf.coredump.cx/p0f.shtml.

共引文献101

同被引文献537

引证文献89

二级引证文献326

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部