首页 | 本学科首页   官方微博 | 高级检索  
     

Honeypot系统研究与比较
引用本文:陈飞,郭平,张敏,谢洪涛. Honeypot系统研究与比较[J]. 后勤工程学院学报, 2004, 20(4): 87-89
作者姓名:陈飞  郭平  张敏  谢洪涛
作者单位:后勤工程学院,训练部,重庆,400016;后勤工程学院,训练部,重庆,400016;后勤工程学院,训练部,重庆,400016;后勤工程学院,训练部,重庆,400016
摘    要:Honeypot系统是构建一个跟实际系统类似的网络陷阱,成为现有网络安全体系的重要补充手段。它可以诱惑攻击者将时间和资源都花费在攻击Honeypot上,从而保护真实工作系统免于攻击。它能监视和跟踪入侵者,收集入侵者的信息,以分析系统所面临的威胁,研究入侵者所用的入侵工具、策略和动机,在网络安全中起着主动防御的作用,是现有安全体系的重要补充。文章分析了构造Honeypot的分类及其优缺点,对Honeypot的实现软件进行比较,并指出了Honeypot系统存在的不足。

关 键 词:蜜罐  入侵检测  入侵诱骗
文章编号:1672-7843(2004)04-0087-03
修稿时间:2004-06-07

The Research and Comparison of Honeypot System
CHEN Fei,GUO Ping,ZHANG Min,XIE Hong-tao. The Research and Comparison of Honeypot System[J]. Journal of Logistical Engineering University, 2004, 20(4): 87-89
Authors:CHEN Fei  GUO Ping  ZHANG Min  XIE Hong-tao
Abstract:Honeypot system is a network trap which is the same as the actual system and becomes an important supplementary method of the existing network security system. It can lure attackers to spend time and resoures attacking honeypot,in this way, it can protect production resources from attacking. It can monitor and track the attackers, collect information on them so that it can analyze the threats that the system is facing and learn the tools, tactics and motives of the attackers. So honeypot is playing the active defense role in the network security and it is an important supplement of the existing security system. This article has analyzed the honeypot's classification and its advantages and disadvantages, has made the comparison with the honeypot realization software and has pointed out the insufficiency of the honeypot system.
Keywords:Honeypot  intrusion detection  intrusion deception  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号