Research and Implementation of a Network Secure System Based on Honeypots
- DOI
- 10.2991/cmes-15.2015.64How to use a DOI?
- Keywords
- Honeypot, Trap system, Network security, Massive scanning, Audit analysis.
- Abstract
Aiming at the shortcomings of the traditional honeypot on massive global scanning attact, this paper constructs a novel network secure system based on honeypots (NSSH). Afterwards, this paper discusses the classic architecture of NSSH, which consists of four parts, firewall/router, analysis network, honeypot and monitor network. The paper also gives out analysis and implementation in detail of the key techniques of NSSH, including the honeypot model and audit analysis based on statistics. Our simulation experiments indicate that comparing to the traditional secure system based on honeypot, NSSH can make network’s security performance to a high level and NSSH has important impact on forecast and monitor attack activities.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Bingqing Luo AU - Zhixin Sun PY - 2015/04 DA - 2015/04 TI - Research and Implementation of a Network Secure System Based on Honeypots BT - Proceedings of the 2nd International Conference on Civil, Materials and Environmental Sciences PB - Atlantis Press SP - 224 EP - 227 SN - 2352-5401 UR - https://doi.org/10.2991/cmes-15.2015.64 DO - 10.2991/cmes-15.2015.64 ID - Luo2015/04 ER -