首页 | 官方网站   微博 | 高级检索  
     

基于闭环控制的入侵诱骗系统的探讨与实现
引用本文:潘军,刘建峰,李祥和.基于闭环控制的入侵诱骗系统的探讨与实现[J].计算机应用与软件,2005,22(11):122-124.
作者姓名:潘军  刘建峰  李祥和
作者单位:解放军信息工程大学信息工程学院,河南,郑州,450002;解放军信息工程大学电子技术学院,河南,郑州,450002
基金项目:郑州市科技局科技攻关计划项目(SP200402089).
摘    要:当今,随着网络攻击手段的日趋复杂,被动的防御措施已经不能满足网络安全的需要。入侵诱骗作为一种主动的网络安全防御手段,能对入侵者进行实时监测,了解其动机、技术等,进行有针对性的防御和学习。文章首先引入了入侵诱骗的定义及入侵诱骗技术的现状,并提出了由IDS、防火墙和入侵诱骗系统组成互动的安全防护模型,最后对诱骗的技术及其实现作了介绍,提出了现阶段所面临的问题。

关 键 词:入侵诱骗  网络安全  蜜罐  蜜网
收稿时间:2004-10-25
修稿时间:2004-10-25

THE DISCUSSION AND IMPLEMENT OF INTRUSION DECOY SYSTEM BASED ON THE CLOSED-LOOP CONTROL
Pan Jun,Liu Jianfeng,Li Xianghe.THE DISCUSSION AND IMPLEMENT OF INTRUSION DECOY SYSTEM BASED ON THE CLOSED-LOOP CONTROL[J].Computer Applications and Software,2005,22(11):122-124.
Authors:Pan Jun  Liu Jianfeng  Li Xianghe
Affiliation:1.Institute of Information Engineering, PLA Information Engineering University, Zhengzhou Henan 450002, China; 2 . Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou Hertan 450002, China
Abstract:Now the technology of attack more and more complex,passive recovery measure can fill the need that network security.The intrusion deception is an active defense measure.It can monitor the intrusion,know it's motive and technology,make correspond measure.In this paper,firstly,we introduce the definition of the intrusion deception and existing the intrusion deception system.Propose to the joint security defense system is compose of the IDS,firewall and the intrusion deception system.Finally,we account for the technology and implement of intrusion deception,refer to in face of question.
Keywords:Intrusion deception Network security Honeypot Honeynet
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号