Dissertation > Excellent graduate degree dissertation topics show

Research on Intrusion Detection Technology Based on Honeypot

Author: HeYongFei
Tutor: JiangJianGuo
School: Xi'an University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: Network Security Intrusion Detection System Honeypot Intrusion detection system and honeypot linkage
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 141
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development and wide application of computer network , network security has become an important area of ??research in computer technology . Numerous network security technologies , intrusion detection systems , its rapid detection methods become an effective supplementary means of firewall technology has achieved impressive performance in the industry . But current detection methods of intrusion detection systems are based on the characteristics of the attack signature database matching detect network attacks can only detect known and unknown network attacks powerless . Therefore, we propose the idea of honeypot technology into the design of intrusion detection systems , The the honeypot system by deliberately attacker sign of weakness to lure the attacker to attack it , attack the honeypot system will record the attacker attack operations through a secure channel event information passed to the intrusion detection system , intrusion detection system to receive event information extracted its analysis and attack signature , and finally the new attack signatures added to the intrusion detection system attack signature database , allowing the intrusion the detection system can detect unknown attacks . The main work of this paper are as follows : 1 . Honeypot technology and intrusion detection technology linkage design ideas , and intrusion detection system to detect unknown attacks accuracy . 2. Session-based inspection methods of attack signatures , to improve the accuracy of detection . 3. Hook callback mechanism is applied the honeypot systems thinking , can provide more detailed attack logging . 4 separate log host design ideas , strengthen the protection of the attack log intensity . 5 . Introduce scalable XML encryption protocol , to ensure the safety of the intrusion detection system and honeypot system communication . Honeypot based intrusion detection techniques presented in this paper , the experiment proved that you can successfully solve the problem of intrusion detection system can not detect unknown attacks . Subsequent research work focuses on the linkage aspects of intrusion detection systems and other security technology . Intrusion detection system has its inherent flaws , relying on its own technology difficult to overcome , follow-up studies intrusion detection system can be assisted by other security technologies to create a more comprehensive , more secure defense system .

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  4. TCDS car ground data communications system designed to achieve integration in 5T,U29-39
  5. E-commerce network security analysis,TP393.08
  6. WAA access protocol based system design and implementation,TP393.08
  7. A Kernel-Level Intelligent Middleware for Honeypot Filesystem,TP393.08
  8. Click -based network traffic research honeypot system,TP393.08
  9. Based on Hybrid Honeypot worm confrontation model,TP393.08
  10. Research and Implementation of Network Security Assessment System,TP393.08
  11. Chaotic Time Series Reconstruction and Safety System of Terrane Deformation in Undersea Mining,TD807
  12. Global Security Network Design and Implementation,TP393.08
  13. Research on Network Communication Signature Generation Technology of Trojan Horses,TP393.08
  14. Research and Implementation on Access Control for Intranet Terminal Based on Policy,TP393.08
  15. Research into Intrusion Detection Approach to System Implementation Based on Neural Network,TP393.08
  16. Campus Network Research and Design for Middle Vocational School,TP393.18
  17. Design and Implementation of the campus network security management system,TP393.18
  18. Intranet Information Security Protection System Design and Implementation,TP393.18
  19. Network intrusion detection technology in data mining algorithm,TP393.08
  20. Research on the Trust Management Model of Distributed Network Based on Mobile P2P,TP393.08
  21. IPv6 environment honeypot system research and application,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile