Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Jilin University(Science Edition)》 2006-01
Add to Favorite Get Latest Update

Performance Improvement of NIDS with Honeypot

LIU Xiao-yang~1,FANG Zhi-yi~2,ZHAI Yu-jia~2,YUAN Longlue~2(1.College of Software,Jilin University,Changchun 130012,China; 2.College of Computer Science and Technology,Jilin University,Changchun 130012,China)  
Combining the characteristics of Honeypot with those of NIDS,we constructed Honeytoken bait data according to data secrecy need of information system and expand NIDS security application module.Through monitoring Honeytoken bait data,tracking in real time and analysing invader's illegal invasion behavior and(invasion) intention,send out the alarm to the system makes the system manager perfect the secrecy policy of the sensitivity data so as to guarantee the security of resources of the data.
【Fund】: 国家科技攻关项目基金(批准号:[2005]科技字0346号);; 吉林省科技厅创新基金(批准号:吉科字2004[107]号)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 LI Rui-xue1,2,FANG Zhi-yi1,2,DAI Zhi-ming1,YAN You-lai1,XIAO Wei1(1.College of Computer Science and Technology,Jilin University,Changchun 130012,China;2.Key Laboratory of Symbol Computation and Knowledge Engineer of Ministry of Education,Jilin University,Changchun 130012,China);Research of IDS Evaluation Method Based on Bayesian Theory[J];Journal of Jilin University(Science Edition);2008-05
2 Xia Lei Jiang jianzhong Gao Zhihao(Information Engineering University,Zhengzhou 450002,Henan,China);A NEW NETWORK SECURITY MECHANISM WHICH CONTAINING HONEYPOT IDS AND INTRUSION RESPONSE SYSTEM[J];Computer Applications and Software;2007-04
3 XU Xian-yue,ZHANG Feng-bin(Computer College,Harbin Univ.of Sci.and Tech.,Harbin 150080,China);Research and Design about Honeynet Based on Two-level Redirect Mechanism[J];Computer Technology and Development;2009-05
【Citations】
Chinese Journal Full-text Database 1 Hits
1 FANG Zhi-yi, LI Zhi, CHENG Mo (College of Computer Science and Technology, Jilin University, Changchun 130012, China);A mesh-first based centric application level multicast[J];Acta Scientiarium Naturalium Universitatis Jilinensis;2004-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHAO Yong-chi, WU Jian, CHEN Bo(College of Computer, Southwest University of Science & Technology, Mianyang 621002, China);Application of Network Address Translation Technology in Firewall[J];Ordnance Industry Automation;2005-01
2 DU Wei-qi,WANG Ping,WANG Hao(Key Lab.of Postal Automation Control Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);Security threat analysis and strategy in industrial control system[J];Journal of Chongqing University of Posts and Telecommunications;2005-05
3 LUO Chunmei(Gtuangdong Industrial equipment fixation Ltd.Guangzhong,Guangdong510080);Application of VPN in Construction Enterprise Information Networks[J];Journal of Changsha University;2003-04
4 WU Di, LI Wen-yin, CHEN Zhen(College of Computer Science & Technology, Jilin University, Chunchun 130026, China);A study of Web publishing technologies for small-office network[J];Progress In Geophysics;2003-04
5 WANG Chao-bin (Institute of Computer Science,China West Normal University,Nanchong 637002,China);LAN Security Research on the Basis of Switch Technology[J];Journal of China West Normal University(Natural Sciences);2006-02
6 GU Qiaoyun,LI Anxin (Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200030; Jiangnan Computer Technology Institute,Wuxi 214083);Design and Implementation of File Integrity Checking System Based on Windows[J];Computer Engineering;2004-S1
7 Zhou Jing Huang He;Response Mechanism and Its Application in NIDS[J];Computer and Communications;2004-05
8 FAN Zhi-yong,XU Zhen-he(Center of Modern Education Technique,Putian University,Putian 351100,China);Discussion on Network Perimeter Security Problem from Wireless Extension[J];Computer and Modernization;2010-05
9 ;Research of the Environment Optimization of Colleges and Universities Website Based on Hierarchical Model[J];Software Guide;2010-07
10 YANG Shang-sen1,XU Xiang-sheng2,WANG Qin1,LI Yang3(1.Modern Education Technology Center,Luoyang Institute of Science and Technology,Luoyang 471023,China;2.Modern Education Technology Center,Anyang Institute of Technology,Anyang 455000,China;3.Department of Operations and Tactics,Air Fore Command College,Beijing 100089,China);Improvement and design Bayesian classifier of intrusion detection[J];Computer Engineering and Design;2008-16
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 SUN Hai-feng, (College of Computer Science, Southwest University of Science & Technology, Mianyang 621010, China);Advanced TCP Port Scan and Its Response[J];Ordnance Industry Automation;2005-04
2 Fang Zhiyi Zhang Meiwen Wei Hua(Department of Computer, Jilin University, Chang Chun 130012, China) Wang Wei(The Center of Blood Station, Jin Zhou 120000, China);Study of new measure to recover and control DOS/DDOS attack[J];Journal of Beijing University of Aeronautics and Astronautics;2004-11
3 TIAN Da-xin~(1a),LIU Yan-heng~(1a),LI Bin~(1b),WANG Yi-bo~(1c),ZHANG Sheng-han~(1c),GAN Wen-zhen~2(1a.College of Computer Science and Technology;1b.College of Mathematics;1c.College of Software,Jilin University,Changchun 130012,China;2. Patent Office of State Intellectual Property,Office of the Peoples Repulic of China,Beijing 100088,China);Intrusion Detection System Based on Dynamic Classification Algorithm[J];Journal of Jilin University(Information Science Edition);2006-02
4 ZHANG Yi,LIU Yan-heng,TIAN Da-xin,LI Chuan-chuan,WANG Yuan(College of Computer Science and Technology,Jilin University,Changchun 130012,China);Intrusion Detection System Based on Association Rules[J];Journal of Jilin University(Information Science Edition);2006-02
5 ZHENG Jun-jie1,XIAO Jun-mo2,LIU Zhi-hua1,WANG Xiao-lei1,WANG Hong-tao1 (1. Institute of Meteorology, Liberation Army University of Science and Technology Nanjing 211101; 2. Institute of Communication Engineering, Liberation Army University of Science and Technology Nanjing 211107);Network Intrusion Detection System Based on Honeypot[J];Journal of University of Electronic Science and Technology of China;2007-02
6 Li Zhitang Xu Xiaodan Prof; College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;The analysis of dynamic honeypot and its design[J];Journal of Huazhong University of Science and Technology;2005-02
7 Song Hua Luo Ping Dai Yiqi (Computer Department ,Tsinghua University,Beijing100084);A New Distributed Portscan_Detection Method[J];Computer Engineering and Applications;2003-08
8 Zhang Yirong Zhao Zhichao Xian Ming Wang Guoyu Xiao Shunping(School of Electronic Science and Engineering,National Univ.of Defense Technology,Changsha410073);A Study on Computer Network Scanning Techniques[J];Computer Engineering and Applications;2004-02
9 Shan Laixiang Yang Shoubao Song Shunhong(Department of Computer Science,U niversity of Science and Technology of China,Hefei230026);Design and Implementation of Distributed Detection of Port Scanning System[J];Computer Engineering and Applications;2004-19
10 LIU Baoxu,XU Rongsheng (Computing Center of Institute of High Energy Physics, CAS, Beijing 100039);Study and Design of the Proactive Security Protecting Measure-Honeynet[J];Computer Engineering;2002-12
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 Tu Angyan 1 Chen Jiancheng 2 (1.Shaoxing University,Shaoxing 312000,Zhejiang; 2.Zhejiang Industry Polytechnic College,Shaoxing 312000,Zhejiang);Research on Network Security Based on Intrusion Detection and Deception Technique as Honeypot System[J];Computer & Telecommunication;2008-02
2 ZHAI Guang-qun,CHEN Xiang-dong,HU Gui-jiang(School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China);Research and design on linkage system of Honeypot and intrusion detected technology[J];Computer Engineering and Design;2009-21
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved