Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (13): 176-178,181.

• Security Technology • Previous Articles     Next Articles

Application of Network Intrusion Deception Technology—— Honeypot System

YANG Hongyu1,2,3, XIE Lixia1   

  1. 1. Software Research Center, Civil Aviation University of China, Tianjin 300300; 2. Tianjin Key Lab for Advanced Signal Processing, Civil Aviation University of China, Tianjin 300300; 3. Department of Computer Science and Engineering, Tianjin University, Tianjin 300072
  • Online:2006-07-05 Published:2006-07-05

网络入侵诱骗技术——蜜罐系统的应用

杨宏宇1,2,3,谢丽霞1   

  1. 1. 中国民航学院软件研究中心,天津 300300; 2. 中国民航学院智能信号与图像处理重点实验室,天津 300300;3. 天津大学计算机科学与工程系,天津 300072

Abstract: This paper presents a kind of network intrusion deception technology–honeypot system and it’s application to cybersecurity, describes it’s architecture and functionalities. This paper also presents some deployment schemes and application features about honeypot system on enterprise networks. Test results demonstrate that honeypot system can decoy, slower and block network intrusion attacks to sensitive hosts effectively

Key words: Network security; Deception system; Trap; Honeyd; Worm

摘要: 介绍了一种网络入侵诱骗技术——蜜罐系统在网络安全中的应用。描述了网络诱骗系统的系统结构和功能。总结了3 种蜜罐级别的功能和特点,提出了蜜罐系统在网络中的部署方案和应用特点。实验结果证明,蜜罐系统可以有效地欺骗、减缓和阻止对敏感主机的网络入侵攻击。

关键词: 网络安全;诱骗系统;陷阱;Honeyd;蠕虫