Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques

碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about...

Full description

Bibliographic Details
Main Authors: Hung-Shian Lin, 林弘憲
Other Authors: Yuh-Ming Cheng
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/03231246565521474857
id ndltd-TW-094STU00396023
record_format oai_dc
spelling ndltd-TW-094STU003960232015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/03231246565521474857 Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques 結合網路誘捕技術在網路蠕蟲攻擊分析之應用研究 Hung-Shian Lin 林弘憲 碩士 樹德科技大學 資訊管理研究所 94 As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks. Yuh-Ming Cheng Jinn-Shing Cheng 程毓明 鄭進興 2006 學位論文 ; thesis 84 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks.
author2 Yuh-Ming Cheng
author_facet Yuh-Ming Cheng
Hung-Shian Lin
林弘憲
author Hung-Shian Lin
林弘憲
spellingShingle Hung-Shian Lin
林弘憲
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
author_sort Hung-Shian Lin
title Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
title_short Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
title_full Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
title_fullStr Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
title_full_unstemmed Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
title_sort integrated network security framework using honeypot and intrusion detection techniques
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/03231246565521474857
work_keys_str_mv AT hungshianlin integratednetworksecurityframeworkusinghoneypotandintrusiondetectiontechniques
AT línhóngxiàn integratednetworksecurityframeworkusinghoneypotandintrusiondetectiontechniques
AT hungshianlin jiéhéwǎnglùyòubǔjìshùzàiwǎnglùrúchónggōngjīfēnxīzhīyīngyòngyánjiū
AT línhóngxiàn jiéhéwǎnglùyòubǔjìshùzàiwǎnglùrúchónggōngjīfēnxīzhīyīngyòngyánjiū
_version_ 1716830497461501952