期刊文献+

业务蜜网系统的有限自动机 被引量:2

Turing machine of production honeynet system
下载PDF
导出
摘要 通过诱骗容忍入侵者的破坏行为,蜜罐可以深入了解入侵工具和入侵目的等入侵行为信息,解决传统网络安全技术对未知入侵攻击无能为力的难题,直接或间接地提高系统网络安全性能。深入研究了蜜罐技术的高级实现形式蜜网系统,对比了业务型和研究型两种蜜网系统,并通过有限自动机形式化模拟了业务蜜网系统,描述了其状态转换过程,为业务蜜网系统的行为描述和结构设计提供了理论依据和论证。 By trapping and tolerating attack actions in the given system, honeypot can learn attack tools,attack motivations and much other intrusion information. It can also solve the dilemmas that the traditional network security technologies could not deal with unknown attack actions so that the performance of the network security is improved directly or indirectly. As the advanced realization form of honeypot technology, the honeynet system is researched into mainly, and the contrast of production honeynet and research honeynet are also made.A Turing machine is presented to simulate the common production honeynet system and describe the state transition of the common production honeynet system and a theory for designing architecture of production honeynet system and its reasoning is supplied.
作者 王璐 秦志光
出处 《重庆邮电学院学报(自然科学版)》 2004年第3期87-90,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 国家信息关防与网络安全保障发展计划项目(2002-研1-B-007) 国家"863"项目资助(2002AA001042)
关键词 蜜罐 业务蜜网 入侵 诱骗 网络安全 honeypot production honeynet intrusion trap network security
  • 相关文献

参考文献11

  • 1夏春和,吴震,赵勇,王海泉.入侵诱骗模型的研究与建立[J].计算机应用研究,2002,19(4):76-79. 被引量:49
  • 2Gene Spafford, Mark Crosbic,COAST group. Dept. of computer science. Active Defense of a Computer System using Autonomous Agents Technical report no.98-005 [R]. Dept. of Computer Science,Purdue University. 1999. 被引量:1
  • 3Reto Baumann and Christian Plattner. The Honeypot White Papers [EB/OL]. www.rbaumann. net, 2002-02-262. 被引量:1
  • 4Honeypot Project. Know Your Enemy:Honeynets [EB/OL]. www. honeynet. org,2002-10-28. 被引量:1
  • 5Honeynet Project [EB/OL]. http : //www.honeynet. org/misc/project. html. 2003-01-13. 被引量:1
  • 6Spencer, Fighting Relay Spam the Honeypot Way [ EB/OL ]. http : //fightrelayspam.homestead. com/. 2002-12. 被引量:1
  • 7WEILER Nathalie. Honeypots for distributed denial of service attacks [A].Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises ( WETICE'02 )[C]. 2002-6,109. 被引量:1
  • 8LISTON Tom. Trapping Worms in a Honeypot: The Tarpit [ EB/OL ]. http ://www. threenorth. com/LaBrea/. 2003-03. 被引量:1
  • 9User-Mode Linux: an OpenSource solution to create a virtual Machine [EB/OL].http://user-mode-linux. sf. net/honeypots.html. 2003-02-05. 被引量:1
  • 10秦志光,刘锦德.安全系统的有限自动机[J].电子科技大学学报,1996,25(1):72-75. 被引量:7

二级参考文献12

共引文献54

同被引文献12

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部