Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2008-14
Add to Favorite Get Latest Update

The Study of Security of Network Basic on Virtual Honeypot

ZOU Wen,CHEN Hao(Hunan University,Changsha 410082,China)  
This text give the definition of Honeypot and virtual Honeypot,introduced can use the Honeyd to simulates virtual computer systems,and analyzed the structure of Honeyd,and its application in many areas of the security of network.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Zhou Lianying Cao Dengyuan Nian Yi (School of Computer Science & Telecommunications Engineering, Jiangsu University,Zhenjiang,Jiangsu 212013);Analysis and Research of a Virtual Honeypot Framework:Honeyd[J];Computer Engineering and Applications;2005-27
2 GUAN Ling-qing1,2 LOU Jia-peng2 LIU Li1,2(1.Xidian University, Xi’ an, Shanxi 710071, China;2.Beijing Electronic Science and Technology Institute, Beijing 100070,China);Extended Design and Implementation of Honeyd[J];Journal of Beijing Electronic Science and Technology Institute;2006-04
【Co-citations】
Chinese Journal Full-text Database 8 Hits
1 LIAN Hong1, LIAN Li-xiang2 (1. Laboratory Center, Guizhou Radio & TV University, Guiyang 550004, China; 2. Automated Command Station, Guizhou Provincial Military Region, Guiyang 550002, China);Design of Virtual Honeypot System[J];Ordnance Industry Automation;2007-01
2 LIANG Jianming,SUN Derong(School of Information Science and Technology,Southwest JiaoTong University,Chengdu 610031,China);The Research of the Honeypot Ssystem Bbased on the Honeyd[J];Journal of Chengdu University(Natural Science Edition);2007-02
3 TANG Xin-yu,CHEN hao (School of Computer and Communication,Hunan University,Changsha 410082,China);The Creation of Intrusion Detection Signatures Based on the Virtual Honeypots[J];Computer Knowledge and Technology;2008-22
4 LI Zhen-wei;Unknown Worms Detection Based on the Extension Honeyd[J];Journal of Langfang Teachers College(Natural Science Edition);2008-05
5 Zhai Jiqiang Qiao Peili(College of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,Heilongjiang,China);HONEYD-BASED HONEYPOT DETECTION WITH IP PACKET FRAGMENT[J];Computer Applications and Software;2009-04
6 ZHAI Ji-qiang,CHEN Yi-dong(College of Computer Science & Technology,Harbin University of Science and Technology,Harbin 150080,China);Design and Application of Virtual Network Security Experimental Platform[J];Research and Exploration in Laboratory;2009-06
7 GUAN Ling-qing1,2 LOU Jia-peng2 LIU Li1,2(1.Xidian University, Xi’ an, Shanxi 710071, China;2.Beijing Electronic Science and Technology Institute, Beijing 100070,China);Extended Design and Implementation of Honeyd[J];Journal of Beijing Electronic Science and Technology Institute;2006-04
8 Tang Haiping (Zhejiang Ocean University,Zhoushan 316000);Design and Realization of the Digital Library's Network Security System Basede on Honeypot[J];China Science & Technology Resources Review;2008-04
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Jia-xi (Computer Science & Technology Dept of Suzhou College,Suzhou 234000,China);Research on Technology of Data Capture Based on Honeynet[J];Journal of Anqing Teachers College(Natural Science Edition);2005-04
2 Peng Changyan, Tang Chaojing, Zhang Senqiang (National University of Defence Technology, Changsha 410073, China);A Study on Honeypot and its Security Enhancement Technology[J];Electronic Engineer;2004-12
3 Sun Zhi-xin Yang Jia-yuan Shi Liang-hui Wang Ru-chuan (Department of Computer Science and Technology, NJUPT, Nanjing 210003, China);Research and Implementation of an Active Network Security System Based on Honeypots[J];Journal of Electronics and Information Technology;2005-03
4 Ma Yanli Zhao Zhansheng Huang Xuan(State Key Laboratory of Information Security Graduate School of USTC,Beijing100094);Honeypot-Network Trap[J];Computer Engineering and Applications;2003-04
5 Zhou Lianying Cao Dengyuan Nian Yi (School of Computer Science & Telecommunications Engineering, Jiangsu University,Zhenjiang,Jiangsu 212013);Analysis and Research of a Virtual Honeypot Framework:Honeyd[J];Computer Engineering and Applications;2005-27
6 Tian Junfeng1 Wang Jianling1 Li Renling2 Fu Yue1 1(College of Mathematic & Computer of Hebei University,Baoding,Hebei 071002) 2(The Library of Hebei Medical University,Shijiazhuang 050091);A Honeypot-Based Model for Studying Worm Signature[J];Computer Engineering and Applications;2005-33
7 WANG Jing`1,WANG Neng`2 (1.Dept.of Electronic Science & Technology,East China Normal University,Shanghai 200062,China;2.Dept.of Computer Science & Technology,East China Normal University,Shanghai 200062,China);Improvement on the Design of Intrusion Detection System[J];Application Research of Computers;2004-07
8 Pan Jun~1 Liu Jianfeng~2 Li Xianghe~1~1(Institute of Information Engineering,PLA Information Engineering University,Zhengzhou Henan 450002,China)~2(Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou Henan 450002,China);THE DISCUSSION AND IMPLEMENT OF INTRUSION DECOY SYSTEM BASED ON THE CLOSED-LOOP CONTROL[J];Computer Applications and Software;2005-11
9 LI Pei-guo,YANG Tian-qi(Department of Computer Science,College of Information,Jinan University,Guangzhou 510632,China);Value of honeypot to network security[J];Computer Engineering and Design;2005-11
10 Gao,Guangyong Chi,Lejun Wang,Yanchun(College of Information, Qiqihar University ,Qiqihar 161006;)(College of Information Science , Jiujiang University , Jiujiang 332005) (School of Software, Harbin Institute of Technology at Weihai, Weihai 264209 ) (College of Computer science, Harbin Science and Technology University, Harbin,151000);The Research of Host Intrusion Detection System Related with Firewall[J];Control & Automation;2005-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved