Study on Application of Honeypot in Campus Net Security

Article Preview

Abstract:

With the development of digital campus construction, the campus network size has been rapid growth, but there are also many network security problems. The honeypot technology is introduced and based on the development of net technology, combined with the campus network security problem, the honeypot technology applied to the campus network in Guangxi Agricultural-vocational Technique College is put forward, which can make the security of campus network unobstructed

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1560-1563

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zheng ChengXin. Network Intrusion Prevention Theory and Practice[M]. BeiJing: Mechanical Industry Press. (2006).

Google Scholar

[2] Honeynet Proje Ct, Know Your Enemy: Honeyllets in Universities. http: /Project. honeynet. org, (2004).

Google Scholar

[3] Edward Balas Camilo Viecco Towards a Third Generation Data Capture Architecture for Honeynets [C] IEEE Workshop on Information Assurance and Security, 2005. 06.

DOI: 10.1109/iaw.2005.1495929

Google Scholar

[4] Hassan Artaila, Haidar Safa. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks[J]. Computers&security, 2006, 25(04).

DOI: 10.1016/j.cose.2006.02.009

Google Scholar

[5] Brian Caswell. Snort 2. 0 torsion Detection [M]. BeiJing: National Defense Industry Press. (2004).

Google Scholar

[6] M. Stiemerling, J. Quittek, and L. Eggert, NAT and firewall traversal issues of host identity protocol (HIP) communication, Network Working Group Request for Comments (RFC) 5207, April (2008).

DOI: 10.17487/rfc5207

Google Scholar

[7] Zi Chen Li, Xiao jia li, Lei gong. Proceedings of the Third International Symposium on Computer Science and Computational Technology(ISCSCT'10). August (2010).

Google Scholar

[8] https: /projects. honeynet. org/. [EB/OL].

Google Scholar

[9] Domseif M, Holz T, Klein C. NoSEBrEak-Attacking Honeynets[C]. Proceedings of 5thAnnual IEEE information Assurance Workshop, (2004).

DOI: 10.1109/iaw.2004.1437807

Google Scholar