首页> 外文学位 >Analyzing intrusions of a hybrid virtual honeynet.
【24h】

Analyzing intrusions of a hybrid virtual honeynet.

机译:分析混合虚拟蜜网的入侵。

获取原文
获取原文并翻译 | 示例

摘要

Computer Security is a topic that is becoming increasingly important to computer users. CERT indicates that the number of security incidents reported for 2003 to be 137,529 [CERT05], a value that has grown exponentially since 1984. Additional knowledge is needed to reduce the vulnerability of computer systems to unwanted break-ins.{09}For this reason, a Hybrid Virtual Honeynet was constructed and employed to gather information on how hackers currently try to breach computer security defenses.; A Honeynet is a computer security research tool, composed of a group of machines residing in a working network, that are designed to be compromised within a controlled environment. A Hybrid Virtual Honeynet divides the tasks so that one machine is use for the Honeywall and one or more for the Honeypots, with the latter controlled through VMWare, a virtual operating system. The Honeywall controls access to the Honeynet while the Honeypots gather evidence of security incidents.; The data gathered from the Hybrid Virtual Honeynet system recorded four different security incidents. Three were Windows based, while the fourth was an attack on the Linux system. The services that were targeted in the attacks were the LSASS, Samba, and the RPC DOM service. Each attack exploited a buffer overrun vulnerability in the listed services. Construction and operation of the Virtual Honeynet verified the approach of the virtual architecture and provided valuable insight about how to make computer systems more secure.
机译:对于计算机用户来说,计算机安全是一个越来越重要的主题。 CERT指出,2003年报告的安全事件数量为137,529 [CERT05],该值自1984年以来就呈指数增长。需要更多的知识来减少计算机系统遭受不想要的入侵的脆弱性。{09}因此,构建并使用了混合虚拟Honeynet来收集有关黑客当前如何尝试破坏计算机安全防御措施的信息。 Honeynet是一种计算机安全研究工具,由位于工作网络中的一组计算机组成,这些计算机旨在在受控环境中受到破坏。混合虚拟Honeynet划分任务,以便一台计算机用于Honeywall,一台或多台用于Honeypot,而后者则通过虚拟操作系统VMWare进行控制。 Honeywall控制对Honeynet的访问,而Honeypots收集安全事件的证据。从混合虚拟Honeynet系统收集的数据记录了四个不同的安全事件。三个是基于Windows的,而第四个是对Linux系统的攻击。攻击所针对的服务是LSASS,Samba和RPC DOM服务。每种攻击都利用列出的服务中的缓冲区溢出漏洞。虚拟Honeynet的构建和运行验证了虚拟体系结构的方法,并提供了有关如何使计算机系统更安全的宝贵见解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号