Dissertation > Excellent graduate degree dissertation topics show

A Kernel-Level Intelligent Middleware for Honeypot Filesystem

Author: FangDang
Tutor: HuangBenXiong
School: Huazhong University of Science and Technology
Course: Communication and Information System
Keywords: Honeypot Filesystem Kernel Module Security Middleware
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 4
Quote: 0
Read: Download Dissertation

Abstract


As a important security research tool and method,honeypothas been applied by many orgnizations and commercial companies for security research and protection.By using honeypot and network comprised of honeypot, which is call honeynet, enterprises and organizations are able to discover the focal security issues and spreading attacking tricks.Much research has been done to improve honeypot’s architecture. Filesystem, which plays an important role in a honeypot, is a common issue in security domain. However, until now,most research on filesystem focuses on access control, encrypting, auditing, forensics and so on, not aiming at honeypot utilization.On the other hand, to the point of how to discover more potential attacks by utilizing the filesystem of honeypot, there are only fewpapers about this. This paper proposes a filesystem middleware which facilitates the honeypot to trap and log attacks. By intercepting different types of file operations, then doing context-related analysis, and making intelligent file operation responses according to analysis results, our filesystem could maximize the value of honeypot in discovering attacks and securing systems.The middleware we designed is based on Linux VFS, it is between VFS and underlying filesystems.Byintercepting file operations from high layer and manipulating them, our middleware can take control of whole system wide file operations, it can log, track, deny and even redirect file access operations, and the occasion of when to apply these manipulationsisdecided by the intelligent analytical module in the middleware.In the latter half of this paper, we did some verificationexperiments, tests andsome performance assessmentof the system which our middleware was introduced in, to ensure that the middleware is not a setbackof system performance. Our middleware serves in kernel environment, so it is transparent to upper layer and can not easily be noticed, which is more favorable in a real environment.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  7. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  10. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  11. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  12. Health protection of migrant workers,D412.6
  13. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  14. Comprehensive Evaluation of Ecological Security of Land Application,X826
  15. Study on Evaluation Index System for Land Ecological Security,X826
  16. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  17. Research and Design of Communication Middleware on AFC System,TP311.5
  18. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  19. Genetically Modified Food Ethics,B82-05
  20. On the systematic construction of the Chinese Communist Party democracy,D262.11
  21. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile