Research on the application of honeypot technology in Intrusion Detection System

被引:0
|
作者
Suo, Xiangfeng [1 ]
Han, Xue [1 ]
Gao, Yunhui [1 ]
机构
[1] Heihe Univ, Heihe, Peoples R China
关键词
Intrusion detection; Honeypot technology; Network;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Detailed introduction of the related knowledge of honeypot and intrusion detection technology. From the adaptability, effectiveness and scalability to a detailed analysis of the current intrusion detection system in the existing problems and the honeypot technology is applied to the advantages of the system in Intrusion Detection System, At the same time put forward a detection model and describes the main functions of the model and the system structure based on the intrusion honeypot technology.
引用
收藏
页码:1030 / 1032
页数:3
相关论文
共 50 条
  • [1] Application of network intrusion deception technology - Honeypot system
    Software Research Center, Civil Aviation University of China, Tianjin 300300, China
    不详
    不详
    Jisuanji Gongcheng, 2006, 13 (176-178+181):
  • [2] Network intrusion detection system based on Honeypot technology
    Zheng, Jun-Jie
    Xiao, Jun-Mo
    Liu, Zhi-Hua
    Wang, Xiao-Lei
    Wang, Hong-Tao
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (02): : 257 - 259
  • [3] Enhancing network intrusion detection system with honeypot
    Yeldi, S
    Gupta, S
    Ganacharya, T
    Doshi, S
    Bahirat, D
    Ingle, R
    Roychowdhary, A
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1521 - 1526
  • [4] HonIDS: Enhancing honeypot system with intrusion detection models
    Tang, Yong
    Hu, HuaPing
    Lu, XiCheng
    Wang, Jie
    FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 135 - +
  • [5] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [6] Raspberry Pi as an Intrusion Detection System, a Honeypot and a Packet Analyzer
    Tripathi, Shyava
    Kumar, Rishi
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 80 - 85
  • [7] Honeypot-Based Intrusion Detection System: A Performance Analysis
    Kondra, Janardhan Reddy
    Bharti, Santosh Kumar
    Mishra, Sambit Kumar
    Babu, Korra Sathya
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2347 - 2351
  • [8] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [9] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [10] A dynamic honeypot design for intrusion detection
    Kuwatly, I
    Sraj, M
    Al Masri, Z
    Artail, H
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 95 - 104