期刊文献+

架构主动方式的网络安全系统 被引量:3

Constitute the passive infrastructure in network
在线阅读 下载PDF
导出
摘要 用主动方式防范同时配合传统的被动方式,建立起一套完备的网络安全体系,能从根本上保证网络安全,避免传统的防范技术的缺陷。本文从主动防范的角度阐述了如何建立一个这样的系统模型,以及如何利用主动方式诱骗跟踪攻击者,并对于数据分析提出了一个分析模型。实践证明,该系统使网络的安全性能达到了一个较高的水平,对入侵行为的预报有着明显的意义。 Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.
出处 《通信学报》 EI CSCD 北大核心 2003年第7期170-175,共6页 Journal on Communications
基金 湖南省然科学基金资助项目(01JJY2064)
关键词 网络安全 主动防范 诱骗主机 网络攻击 数据统计分析 network security active technology decoy server analysis model
  • 相关文献

参考文献8

  • 1SCHWABE J, ROHRING N. Lessons learned from deploying a honeypot[J].Information Security Bulletin,2000,11(1): 128-224.
  • 2SPITZNER L. The value of honeypots[EB/OL]. www.securityfocuces.com,Dec 2000.
  • 3RAIKOWD. Building your own honeypot[EB/OL], www.linuxsecurity.com,Jun 2000.
  • 4COHEN F. The Deception toolkit home page[EB/OL].www.all.net,Sep 2001.
  • 5Recourse technoiogics inc. honeypot effectiveness study[EB/OL].www.recourse.com/news/press/releases/r102400.html,Sep,2000.
  • 6The Huneynet Project .Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Biackhat Community [M]. USA Addison-Wesley Pub, 2000.
  • 7MORAN D B.Tapping and tracking hackers[EB/OL]. www.recourse.com, July 2000.
  • 8BROCKWELL P J, DAVIS R A.Times Series:Theory and Methods[M].Springer,Reihe Pub,1991.

同被引文献12

  • 1张洪,蜜罐技术的实现及其优势[J].中国计算机报,2004.8.12.
  • 2Lance SpitzneL Definitions and value of honeypots, http:/ /www. tracking-hackers, conl/papers/honeypots, html,2003,5.
  • 3The honeynet project. http://projeet.honeynct.org.
  • 4Lance Spitzner. Definitions and value of honeypots. Http://www.tracking-hackers.com/papers/honeypots.html, 2003,5.
  • 5Deception Toolkit. 2001. http://www.all.net/dtk/index.html.
  • 6Intrusion battleground evolves. http://www. nwfusion. com/reviews/2001/1008bg.html.
  • 7Review: Intrusion-detection products grow up. http://www.nwfusion.com/reviews/2001 / 1008rev. html.
  • 8The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html.
  • 9Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots.
  • 10Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部