• DocumentCode
    2727397
  • Title

    The research and design of honeypot system applied in the LAN security

  • Author

    Li, Li ; Sun, Hua ; Zhang, Zhenyu

  • Author_Institution
    Sch. of Inf. Sci. & Eng., Xinjiang Univ., Urumqi, China
  • fYear
    2011
  • fDate
    15-17 July 2011
  • Firstpage
    360
  • Lastpage
    363
  • Abstract
    For the hackers´ attacks on the network is constantly updated, the traditional defense dealing with unknown invasion become powerless and can not effectively protect the network. This paper proposes the application of honeypots in the LAN system, where the virtual and physical honeypots are placed in a specific location. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. If necessary, the invasion records can be extracted to be evidence. In this way, you can learn about the latest attack methods and tools, updating Firewall and intrusion detection knowledge base and to some extent detering the intruder. This thesis focuses on the combination of a variety of defense technology to explore completely the advantages of Firewall, intrusion detection and honeypot technology to enhance the local area network security.
  • Keywords
    Internet; authorisation; computer network security; knowledge based systems; local area networks; Internet; LAN security; firewall; hacker attacks; honeypot system design; intrusion detection; knowledge base system; local area network security; network protection; Computer hacking; Computers; Fires; Local area networks; Logic gates; Servers; Firewall; Honeynet; Honeypot; Intrusion Detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering and Service Science (ICSESS), 2011 IEEE 2nd International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-9699-0
  • Type

    conf

  • DOI
    10.1109/ICSESS.2011.5982237
  • Filename
    5982237