Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-01
Add to Favorite Get Latest Update

Design and Implementation of Honeypot Scan Detection System

YIN Chunmei,LI Mingchu,MA Jianbo(Department of Computer Science and Technology,School of Electronic Information Engineering,Tianjin University,Tianjin 300072)  
Computer security has been focused on passive defense strategies and intrusion detection system has its own security vulnerability.This paper designs and implements honeypot scan detection system,combines the active defense honeypot with passive defense intrusion detection,introduces a new 2-dimension link structure for slow scan and new event mechanism in the system,and solves some weaknesses in known techniques.The tests on this system in a typical network environment show that the system can provide early warning about scan,detecting slow scan and some new,attacks and has very low false positives and false negatives.
【Fund】: 国家“863”计划基金资助项目(2002AA142010);; 国家自然科学基金资助项目(90412007)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 LAN Cong,SU Guiyang(Shanghai Jiaotong University,School of Information Security Engineering,Shanghai 200031);Implementation of Honeynet for Detection Web Attack[J];Computer Programming Skills & Maintenance;2010-16
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 SUN Hai-feng, (College of Computer Science, Southwest University of Science & Technology, Mianyang 621010, China);Advanced TCP Port Scan and Its Response[J];Ordnance Industry Automation;2005-04
2 ZHENG Jun-jie1,XIAO Jun-mo2,LIU Zhi-hua1,WANG Xiao-lei1,WANG Hong-tao1 (1. Institute of Meteorology, Liberation Army University of Science and Technology Nanjing 211101; 2. Institute of Communication Engineering, Liberation Army University of Science and Technology Nanjing 211107);Network Intrusion Detection System Based on Honeypot[J];Journal of University of Electronic Science and Technology of China;2007-02
3 Li Zhitang Xu Xiaodan Prof; College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;The analysis of dynamic honeypot and its design[J];Journal of Huazhong University of Science and Technology;2005-02
4 LIU Xiao-yang~1,FANG Zhi-yi~2,ZHAI Yu-jia~2,YUAN Longlue~2(1.College of Software,Jilin University,Changchun 130012,China; 2.College of Computer Science and Technology,Jilin University,Changchun 130012,China);Performance Improvement of NIDS with Honeypot[J];Journal of Jilin University(Science Edition);2006-01
5 Hu Zhaohui Chen Qi Yu Ruizhao (Computer Science Department, Zhejiang University, HangZhou 310027);Port Scanning Techniques and Analysis of Attack and Defense[J];Computer Engineering and Applications;2001-10
6 Wang Lilin 1,2 Xu Rongsheng 21 (Graduate School,University of Science&Technology of China,Beijing100039) 2 (Computing Center,Institute of High Energy Physics,CAS,Beijing100039);The Honeynet Security System Based on Proactive Defence[J];Computer Engineering and Applications;2002-17
7 Song Hua Luo Ping Dai Yiqi (Computer Department ,Tsinghua University,Beijing100084);A New Distributed Portscan_Detection Method[J];Computer Engineering and Applications;2003-08
8 Zhang Yirong Zhao Zhichao Xian Ming Wang Guoyu Xiao Shunping(School of Electronic Science and Engineering,National Univ.of Defense Technology,Changsha410073);A Study on Computer Network Scanning Techniques[J];Computer Engineering and Applications;2004-02
9 Ma Sijia Xue Zhi Shan Rongsheng Li Jianhua(School of Information Security Engineering,Shanghai Jiaotong University,Shanghai200030);An Intrusion Detection System Combined with Initiative Detecting Tech nique[J];Computer Engineering and Applications;2004-16
10 Shan Laixiang Yang Shoubao Song Shunhong(Department of Computer Science,U niversity of Science and Technology of China,Hefei230026);Design and Implementation of Distributed Detection of Port Scanning System[J];Computer Engineering and Applications;2004-19
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved