Dissertation > Excellent graduate degree dissertation topics show

Research on the Technology of Interdomain Communication Support in VM-Honey Based Intrude Detect System

Author: SuHang
Tutor: WuQingBo
School: National University of Defense Science and Technology
Course: Software Engineering
Keywords: IDS Honeypot Virtual Machine Inter-domain communication
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 66
Quote: 0
Read: Download Dissertation

Abstract


In recent years, the rapid development of hardware support and promote the development of a virtual machine. Disadvantage of virtual machine performance in shrinking, especially people continues to deepen understanding of the virtual machine in the virtual machine applications are continuously expanding. In this paper, the virtual machine high isolation, high availability and manageability features to explore virtual machine in a safe direction. After in-depth understanding of the current status quo of the virtual machine and security, this paper proposed a security system for the existing security trends - Honeypot intrusion detection systems. The system uses a virtual machine fusion of traditional IDS and honeypot system to enhance the security systems ability to detect attacks. Since the beginning of the virtual machine design did not take into account the safety direction, this paper focuses on how to modify the virtual machine to adapt to this set of safety systems. In the study, design a set of inter-domain communication technology to promote the integration of the work of the honeypot and IDS, and set communication technology testing and evaluation. Virtual machine object of this study is Xen, mainly because it is very suitable for the study of the security aspects. In this paper, in-depth understanding of the the Xen framework and code analysis and in-depth understanding of the two security systems - honeypot IDS, developed a set of security model to achieve the complementary integration work of both. In addition, in order to achieve this security model, in-depth analysis of Xen on a series of inter-domain communication mechanism, proposed a set of inter-domain communication model. The communication model to enhance inter-domain communication capabilities of the security system, In addition to design and implement the necessary modules for communication systems, the core algorithm and recovery mechanisms, and at the same time to do the evaluation work on the core algorithm. In addition, based on the characteristics of the core algorithm proposed a more efficient, more flexible, more subtle inter-domain communication mechanism technology. In the study of the safety systems, understand and analyze some commonly honeypot and IDS system as a basic module, and select the appropriate honeypot and IDS, and modify the code to adapt to the security system of the honeypot and IDS. Also This paper focuses on the inter-domain communication system applied to the security system to help the integration of two traditional security systems for a new security system. The thesis completion of the work of the national \has great theoretical and practical significance.

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. A Kernel-Level Intelligent Middleware for Honeypot Filesystem,TP393.08
  3. A kind of virtual cluster lightweight communication mechanism,TP302
  4. Lightweight , multi-platform virtual machine extension,TP391.9
  5. Click -based network traffic research honeypot system,TP393.08
  6. Based on Hybrid Honeypot worm confrontation model,TP393.08
  7. Application of Support Vector Machine in the Intrusion Detection,TP393.08
  8. Research on Network Communication Signature Generation Technology of Trojan Horses,TP393.08
  9. IPv6 environment honeypot system research and application,TP393.08
  10. Intranet IPv6 Transition Network Integration Platform,TP393.04
  11. Research and Implement of Intrusion Detection System Based on P2P and Mobile Agent,TP393.08
  12. A Study on Honeypot Protection Technology Based on Rootkit,TP393.08
  13. A Study on Firewall and IDS Linkage Algorithm,TP393.08
  14. Based on Virtual Honeynet Intrusion Detection System,TP393.08
  15. Application and Research of Intrusion Detection System Base on Honeypot,TP393.08
  16. On Defense-in-Depth Strategy and Infrastructure Management of Campus Network,TP393.18
  17. Research and Implementation of Honeypot Based on Redirection Mechanism,TP393.08
  18. Research on Intrusion Control and Audit Expert System,TP393.08
  19. Research and Application of Early Warning System for Network Attacks Based on Honeypot Technology,TP393.08
  20. Research on Application of Data Mining in Honeypot Log Analysis,TP393.08
  21. Reasearch and Development of an Honeypot System Based on Honeyd,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile