Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques
碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/03231246565521474857 |
id |
ndltd-TW-094STU00396023 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094STU003960232015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/03231246565521474857 Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques 結合網路誘捕技術在網路蠕蟲攻擊分析之應用研究 Hung-Shian Lin 林弘憲 碩士 樹德科技大學 資訊管理研究所 94 As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks. Yuh-Ming Cheng Jinn-Shing Cheng 程毓明 鄭進興 2006 學位論文 ; thesis 84 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 樹德科技大學 === 資訊管理研究所 === 94 === As we know the network security becomes very important for internet users. Honeypots are closely monitored network decoys serving several purposes. Hence, they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. An Intrusion Detection System (IDS) provides much the same purpose as a burglar alarm system installed in a house. In case of possible intrusion, the IDS system will issue some type of warning or alert. An operator will then tag events of interest for further investigation by the Incident Handling team. In this paper, we propose a framework by adopting the honeypot technique and honeynet tool in the applications of network intrusion detection and network intrusion protection system. By using the proposed techniques, we can therefore more effectively secure network from network intrusion and attacks.
|
author2 |
Yuh-Ming Cheng |
author_facet |
Yuh-Ming Cheng Hung-Shian Lin 林弘憲 |
author |
Hung-Shian Lin 林弘憲 |
spellingShingle |
Hung-Shian Lin 林弘憲 Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
author_sort |
Hung-Shian Lin |
title |
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
title_short |
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
title_full |
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
title_fullStr |
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
title_full_unstemmed |
Integrated Network Security Framework using Honeypot and Intrusion Detection Techniques |
title_sort |
integrated network security framework using honeypot and intrusion detection techniques |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/03231246565521474857 |
work_keys_str_mv |
AT hungshianlin integratednetworksecurityframeworkusinghoneypotandintrusiondetectiontechniques AT línhóngxiàn integratednetworksecurityframeworkusinghoneypotandintrusiondetectiontechniques AT hungshianlin jiéhéwǎnglùyòubǔjìshùzàiwǎnglùrúchónggōngjīfēnxīzhīyīngyòngyánjiū AT línhóngxiàn jiéhéwǎnglùyòubǔjìshùzàiwǎnglùrúchónggōngjīfēnxīzhīyīngyòngyánjiū |
_version_ |
1716830497461501952 |