{"title":"The research and design of honeypot system applied in the LAN security","authors":"Li Li, Hua Sun, Zhenyu Zhang","doi":"10.1109/ICSESS.2011.5982237","DOIUrl":null,"url":null,"abstract":"For the hackers' attacks on the network is constantly updated, the traditional defense dealing with unknown invasion become powerless and can not effectively protect the network. This paper proposes the application of honeypots in the LAN system, where the virtual and physical honeypots are placed in a specific location. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. If necessary, the invasion records can be extracted to be evidence. In this way, you can learn about the latest attack methods and tools, updating Firewall and intrusion detection knowledge base and to some extent detering the intruder. This thesis focuses on the combination of a variety of defense technology to explore completely the advantages of Firewall, intrusion detection and honeypot technology to enhance the local area network security.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2011.5982237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
For the hackers' attacks on the network is constantly updated, the traditional defense dealing with unknown invasion become powerless and can not effectively protect the network. This paper proposes the application of honeypots in the LAN system, where the virtual and physical honeypots are placed in a specific location. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. If necessary, the invasion records can be extracted to be evidence. In this way, you can learn about the latest attack methods and tools, updating Firewall and intrusion detection knowledge base and to some extent detering the intruder. This thesis focuses on the combination of a variety of defense technology to explore completely the advantages of Firewall, intrusion detection and honeypot technology to enhance the local area network security.