DocumentCode
2727397
Title
The research and design of honeypot system applied in the LAN security
Author
Li, Li ; Sun, Hua ; Zhang, Zhenyu
Author_Institution
Sch. of Inf. Sci. & Eng., Xinjiang Univ., Urumqi, China
fYear
2011
fDate
15-17 July 2011
Firstpage
360
Lastpage
363
Abstract
For the hackers´ attacks on the network is constantly updated, the traditional defense dealing with unknown invasion become powerless and can not effectively protect the network. This paper proposes the application of honeypots in the LAN system, where the virtual and physical honeypots are placed in a specific location. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. If necessary, the invasion records can be extracted to be evidence. In this way, you can learn about the latest attack methods and tools, updating Firewall and intrusion detection knowledge base and to some extent detering the intruder. This thesis focuses on the combination of a variety of defense technology to explore completely the advantages of Firewall, intrusion detection and honeypot technology to enhance the local area network security.
Keywords
Internet; authorisation; computer network security; knowledge based systems; local area networks; Internet; LAN security; firewall; hacker attacks; honeypot system design; intrusion detection; knowledge base system; local area network security; network protection; Computer hacking; Computers; Fires; Local area networks; Logic gates; Servers; Firewall; Honeynet; Honeypot; Intrusion Detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering and Service Science (ICSESS), 2011 IEEE 2nd International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-9699-0
Type
conf
DOI
10.1109/ICSESS.2011.5982237
Filename
5982237
Link To Document