- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Honeypot, Botnet, Security Measurement, Email Spam.ppt
Honeypot, Botnet, Security Measurement, Email Spam Cliff C. Zou CDA6938 02/01/07 What Is a Honeypot? “A honeypot is a faked vulnerable system used for the purpose of being attacked, probed, exploited and compromised.” Example of a Simple Honeypot Install vulnerable OS and software on a machine Install monitor or IDS software Connect to the Internet (with global IP) Wait monitor being scanned, attacked, compromised Finish analysis, clean the machine Benefit of Deploying Honeypots Risk mitigation: A deployed honeypot may lure an attacker away from the real production systems (“easy target“). IDS-like functionality: Since no legitimate traffic should take place to or from the honeypot, any traffic appearing is evil and can initiate further actions. Attack analysis: Binary code analysis of captured attack codes Spying attacker’s ongoing actions Find out reasons, and strategies why and how you are attacked. Honeypot Classification High-interaction honeypots A full and working OS is provided for being attacked VMware virtual environment Several VMware virtual hosts in one physical machine Low-interaction honeypots Only emulate specific network services No real interaction or OS Honeyd Honeynet/honeyfarm A network of honeypots Low-Interaction Honeypots Pros: Easy to install (simple program) No risk (no vulnerable software to be attacked) One machine supports hundreds of honeypots Cons: No real interaction to be captured Limited logging/monitor function Easily detectable by attackers High-Interaction Honeypots Pros: Real OS, capture all attack traffic/actions Can discover unknown attacks/vulnerabilities Cons: Time-consuming to build/maintain/analysis Risk of being used as stepping stone Must have a firewall blocking all outgoing traffic High computer resource requirement Honeynet A network of honeypots High-interaction honeynet A distributed network composing many honeypots Low-interaction honeynet Emulate a virtual network in one physical machine Example: honeyd
您可能关注的文档
- 2.3 设 为互异的插值节点,求证.ppt
- 2007年12月18日台北医学院公卫系-How The Eye Works.ppt
- 2010年压轴题专题讲座 海南省中考二次函数问题技术命题探究.ppt
- 2012 Crop Budgets Corn, Soybeans, Wheat .ppt
- 2014年国家公务员考试讲座——资料分析.ppt
- 3.4 Quadratic Variation.ppt
- 40 GHz MMIC Power Amplifier in InP DHBT Technology.ppt
- 53071 Hydraulics and HydrologyProject #1Pelton Turbine.ppt
- 6.3二叉树的遍历.ppt
- 911 services wireline, wireless and VoIP.ppt
- How to translate ER Model to Relational Model.ppt
- HSCI 678 Intro to US Healthcare System.ppt
- httphhmlztx.cn.alibaba.com.ppt
- HUMAN RESOURCES.ppt
- Hyperlipidemia.ppt
- ICD皮下囊袋破溃直接改埋置同侧胸大肌下二例.ppt
- IEEE 802.16eMobile WiMAX.ppt
- IFC 2008.ppt
- Infiltrating Basal Cell Carcinoma.ppt
- Interconnect and PackagingLecture 3 Skin Effect.ppt
文档评论(0)