Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques

碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about...

Full description

Bibliographic Details
Main Authors: Hung-Shian Lin, 林弘憲
Other Authors: Yuh-Ming Cheng
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/03231246565521474857
Description
Summary:碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks.