Abstract
Along with the rapid development of Internet technology, Network security has become a very serious problem. At present the main security technologies include firewall technology, intrusion detection technology, access control technology, data encryption technology and so on. These safety technologies are based on the passive defence, so they are always in a passive position when thay are face to the up-to-date attack means. So,we put forward a kind of active defense network security technology -Honeypot technology and research detailedly the dynamic honeypot design and implementation based on Honeypot.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fu, X., Yu, W., Cheng, D., et al.: On Recognizing Virtual Honeypots and Countermeasures. In: The 2nd IEEE Interational Symposium on Dependable, Autonomic and Secure Computing, vol. 9, pp. 220–230 (2006)
Leita, C., Mermoud, K., Daeier, M.: SeriptGen:all automated script generation tool for honeyd. In: 21st Annual Computer Security Applications Conference, vol. 9, pp. 125–135 (2008)
Zhang, F., Zhou, S., Qin, Z., et al.: Honeypot:a supplemented active defense system for network security. In: Proceedings of the Fourth International Conference, PDCAT 2009, vol. 8, pp. 231–235 (2003)
Kreibich, C., Crowcroft, J.: Honeycomb-Creating intrusion Detection Signatures Using Honeypots (EB/PDF), http://www.sigcomm.org/I-IotNets-II/papershaoneycomb.pal.2010
Domscif, M., Holz, T., Mathes, J., Weisemoller, I.: Measuring Security Threats with Honeypot Technology, 21–29 (2009)
Kwong, L., Yah: Virtual honeynet srevisited.SMC Information Assurance Workshop. In: Proceedings from the Sixth Annual IEEE, vol. 9, pp. 230–240 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, X., Peng, L., Li, C. (2011). The Dynamic Honeypot Design and Implementation Based on Honeyd. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 214. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23321-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-23321-0_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23320-3
Online ISBN: 978-3-642-23321-0
eBook Packages: Computer ScienceComputer Science (R0)