Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/03231246565521474857 |
Summary: | 碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks.
|
---|