检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘亚群 高雅卓 邢长友 张国敏 Liu Yaqun;Gao Yazhuo;Xing Changyou;Zhang Guomin(Army Engineering University,Nanjing 210007,Jiangsu,China)
机构地区:[1]中国人民解放军陆军工程大学,江苏南京210007
出 处:《计算机应用与软件》2024年第10期362-371,共10页Computer Applications and Software
基 金:国家自然科学基金项目(61379149);国家博士后科学基金项目(2017M610296)。
摘 要:蜜网通过构建诱捕环境并伪装成真实的业务网络来欺骗攻击者,吸引攻击者攻击,监控攻击者的行为并分析其特征,已经成为网络欺骗防御的核心手段。介绍蜜网的定义、分类与功能,在此基础上结合蜜网的攻击防护流程,按照欺骗场景生成部署、攻击诱捕、攻击行为分析、安全性增强等四种蜜网关键技术对现有研究成果进行分析归纳,详细讨论上述关键技术的作用及其研究进展,总结分析现有蜜网研究存在的问题与不足,展望未来的发展趋势和面临的挑战。Honeynet deceives the attackers by constructing a trapping environment and masquerading as a real business network.Attracting attackers,monitoring attackers behavior and analyzing their characteristics have become the trump card of network deception defense.The definition,classification and functions of honeynets were introduced.On this basis,combining the attack protection process of honeynets,the existing research results were analyzed and concluded according to the key technologies of honeynets,such as generation and deployment of deception scenarios,attack trapping,attack behavior analysis,and security enhancement.In addition,the effect and research progress of the above-mentioned key technologies were discussed in detail and the existing problems and shortcomings in the existing honeynet research were summarized.The development trend and challenge in the future were prospected.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33