Reasearch and Application of Honeynet Key Technique

Article Preview

Abstract:

Honeynet is a high-alternation honeypot. The architecture of honeynet has three kernel functions: data control, data capture and data analysis. Based on the analysis of technical characteristic of honeynet, we discuss about using honeynet to make network security recovery.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

84-87

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Angel Eduardo Avila: Analyzing intrusions of a hybrid virtual honeynet, The University of Texas at EIPaso, (2008).

Google Scholar

[2] The Honeynet Project : Know Your Enemy: Honeywal CDROM Roo, 3rd GenerationTechnology[ZOL], ( 2005).

Google Scholar

[3] Edward Balas, CamiloViecco: Towards a Third Generation Data Capture Architecture for Honeynets[C], IEEE Workshop on Information Assurance and Security(2005).

DOI: 10.1109/iaw.2005.1495929

Google Scholar