Research and Implementation of Experimental Platform for Network Attack and Defence Based on Honeynet

Article Preview

Abstract:

The key problem of the network and information security is protect the computer system and network effectively. An open virtual experiment platform of the network attack and defence, which simulates network enviroment, is builded by virtue of Honeypot and Honeynet. The entire network is virtually contained on a single, physical, system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

2221-2224

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lance Spitzner. The Value of Honeypots, Part Two: Honeypot Solutions and Legal Issues. http: /www. securityfocus. com/ infocus/1498. 2001, (10) : 23-24.

Google Scholar

[2] Edward Balas and Camilo Viecco Advanced Network Management Lab Indiana University. Towards a Third Generation Data Capture Architecture for honeynets. Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 15- 17 June.

DOI: 10.1109/iaw.2005.1495929

Google Scholar

[3] honeynet Project. KnowYourEnemy: honeynets, http: /www. honeynet. org/papers/ honeynet /index. Html. (2006).

Google Scholar

[4] HoneynetProjeet. Know Your Enemy: GenII Honeynets. http: /www. Honeynet. org/papers/gen2/index. Html. (2005).

Google Scholar

[5] Gao Litao, Liang Mangui. New Technology of Honeynet and Application [R]. Technology Research and Application. 2007. 1.

Google Scholar