Title :
Research on network security of defense based on Honeypot
Author :
Bao, Jian ; Ji, Chang-peng ; Gao, Mo
Author_Institution :
Dept. of Comput. Sci., Liaoning Tech. Univ., Fuxin, China
Abstract :
With the development of the network attack technique, the increase of the security risk on the internet, each host in the network may be the target of the attack. Honeypot technology can proactively detect and respond to the intrusion and the attack of the network. Compared with other security mechanisms, it has the feature of using simply, configurations flexibly, occupying less resource, and working effectively in a complex environment, furthermore, all the collected data and information has a good relevant and study value, so that it can capture and analyze the characteristic, which can effectively limit the spread of the aggressive behavior on the network.
Keywords :
Internet; computer network security; Internet; honeypot technology; intrusion detection system; net defense; network attack technique; network security; security risk; Educational institutions; Lead; Logic gates; Monitoring; Honeypot; firewall; intrusion detection system; net defense; network security;
Conference_Titel :
Computer Application and System Modeling (ICCASM), 2010 International Conference on
Conference_Location :
Taiyuan
Print_ISBN :
978-1-4244-7235-2
Electronic_ISBN :
978-1-4244-7237-6
DOI :
10.1109/ICCASM.2010.5622780