Abstract
In order to improve the network security design, the attacks of hackers and viruses, which is most headache thing in a large number of network security, it has not been a good solution, and there is a growing serious trend. Traditional network security solutions are unable to meet the needs of the people’s urgent. They need to research and development of new network security products. This paper study one kind that can be used as a decoy system for cyber attacks, honey pot and honey net technology, and introduced to an active defense model. And then design a new network security active defense system model, and given a specific design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, D.-X., Li, W.-H.: Highest security secrets. Machinery Industry Press, Beijing (2004)
Lei, Z.: Research and Design of an active defence system. Chengdu University of Technology (May 2009)
Lu, B.-H., Wang, N.: Information systems security principles and application. Tsinghua University Press
Zhang, L.: Intrusion prevention system design and implementation. Master’s thesis. Jilin University (June 2007)
Zhai, G.-Q., Chen, X.-D.: Honey pots and intrusion detection technology linkage system design. Computer Engineering Design 30(21) (2010)
Valeur, F., Vigna, G., Kruegel, C., et al.: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Transactions on Dependable and Secure Computing 1(3), 146–169 (2004)
Cui, Z., Fang, L., Tao, W.: New network security strategies. Honey Pot Science and Technology. Computer Application and Software 2, 99–101 (2004)
Zou, R.: Honeypot technology research and application. Computer Security, 69–70 soccer (May 2010)
Sadasivam, K., Samudrala, B., Yang, T.A.: Design of network security projects using honeypots, pp. 282–293. University of Huston-Clear Lake (2009)
Know Your Enemy: Honey nets-What A Honey net Is, Its Value, How It Works, And Risk Involved. Honey net Project, USA (November 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, H. (2012). Study on Network Security Proactive Defense Model Based on Honey Pot Technology. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-34041-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34040-6
Online ISBN: 978-3-642-34041-3
eBook Packages: Computer ScienceComputer Science (R0)