The Design of Website Security Defense System Based on Honeypot Technology

被引:0
|
作者
Yao, Jun [1 ]
Chen, Jing [1 ]
机构
[1] Xian Univ Sci & Technol, Commun & Informat Syst, Xian 710054, Peoples R China
关键词
Honeypot; Log; Virtual Machine; Network Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of Internet, network security has become increasingly important, the existing network security technologies are all passive defense, which has its inherent disadvantages. In summary, to defense the constantly updated network attacks technology, the emergence of active defense system is inevitable. The honeypot technology which belongs to active defense technology has introduced spoofing technology of the traditional means of attack into the field of security and defense. The honeypot deals with network security issues from a new direction. Combining honeypot technology and the site security, this paper simulated a small, low-interaction honeypot for securing information of website.
引用
收藏
页码:1502 / 1507
页数:6
相关论文
共 50 条
  • [1] A Design of Linkage Security Defense System Based on Honeypot
    Feng, Gangfu
    Zhang, Chen
    Zhang, Quan
    [J]. TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 70 - 77
  • [2] Design of Network Security Experiment Teaching System Based on Honeypot Technology
    Zhu, Chen
    Li, Qiang
    Sun, Bin
    Jin, Xinyu
    Zhou, Yusun
    Xie, Muhan
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 2132 - 2136
  • [3] Honeypot-based Defense System Research and Design
    Zhang Li-juan
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
  • [4] Honeypot: a supplemented active defense system for network security
    Zhang, F
    Zhou, SJ
    Qin, ZG
    Liu, JD
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 231 - 235
  • [5] The Design of Power Security Defense System Based on Resource Pool Cloud Computing Technology
    Nan, Dang
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2020, 11 (01) : 1 - 11
  • [6] The Design and Implementation of Security Defense System Based on Android
    Huang, Min
    Guo, Jiangbo
    Zhang, BaoShuai
    Zhang, Tian
    Ren, Pengpeng
    [J]. PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 292 - 295
  • [7] Malicious Website Detection Based on Honeypot Systems
    Koo, Tung-Ming
    Chang, Hung-Chang
    Hsu, Ya-Ting
    Lin, Huey-Yeh
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ENGINEERING (CSE 2013), 2013, 42 : 76 - 82
  • [8] The Design and Implementation of Security Defense Technology Based on Mandatory Running Control
    Liu Jizhen
    Wu Kehe
    Tong, Zhang
    Gang, Ma
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 770 - +
  • [9] Design of A Game Theory Based Defense System for Power System Cyber Security
    Ni, Ming
    Srivastava, Anurag K.
    Bo, Rui
    Yan, Jie
    [J]. 2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 1049 - 1054
  • [10] Design of DRM System Based on the Information Security Technology
    Liang, Zhengli
    Cai, Dongmei
    [J]. 2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 335 - 341