硕士论文-嵌入式网络环境下蜜罐技术研究

上传人:新** 文档编号:508106310 上传时间:2022-12-24 格式:DOC 页数:58 大小:15.21MB
返回 下载 相关 举报
硕士论文-嵌入式网络环境下蜜罐技术研究_第1页
第1页 / 共58页
硕士论文-嵌入式网络环境下蜜罐技术研究_第2页
第2页 / 共58页
硕士论文-嵌入式网络环境下蜜罐技术研究_第3页
第3页 / 共58页
硕士论文-嵌入式网络环境下蜜罐技术研究_第4页
第4页 / 共58页
硕士论文-嵌入式网络环境下蜜罐技术研究_第5页
第5页 / 共58页
点击查看更多>>
资源描述

《硕士论文-嵌入式网络环境下蜜罐技术研究》由会员分享,可在线阅读,更多相关《硕士论文-嵌入式网络环境下蜜罐技术研究(58页珍藏版)》请在金锄头文库上搜索。

1、摘 要摘 要嵌入式系统应用已渗入到工业、军事、日常生活等各个领域。随着嵌入式系统应用的普遍化和网络技术的不断发展,嵌入式网络应用将成为嵌入式系统应用的发展趋势。嵌入式网络的存在,必须要考虑网络安全方面的问题。嵌入式系统本身资源有限,无法存储和运行大型的安全工具。而且网络安全技术多是被动的防御技术,对攻击者了解不足,更无法应对层出不穷的未知攻击。蜜罐是一种主动防御技术,它不会直接给网络安全带来帮助,只是收集攻击者攻击的相关信息并分析这些信息,来研究攻击者常用的攻击方式和系统所存在的漏洞,间接的为网络安全带来帮助。随着嵌入式网络应用的广泛性,本文在嵌入式网络环境下应用蜜罐技术。本文在分析研究嵌入式

2、网络安全及蜜罐技术的基础上,提出嵌入式蜜罐和嵌入式蜜网的思路。通过对几种典型蜜罐产品的比较,本文选择虚拟蜜罐Honeyd作为嵌入式环境下的研究对象。在分析研究Honeyd的框架结构及关键技术的基础上,对蜜罐Honeyd在嵌入式系统上进行移植,并在蜜罐移植的基础上提出对蜜罐的扩展设想。最后在嵌入式网络环境下对蜜罐进行部署并测试分析,实验结果表明,嵌入式蜜罐对嵌入式网络安全起到保护作用。关键词:嵌入式系统;嵌入式网络;蜜罐;Honeyd- I -AbstractThe application of the embedded system has filtered into industry, mi

3、litary affairs and some other daily life domains. With the generalization of the embedded system and the development of the embedded system, network and the Internet technology, the embedded network will become the trend of the application of the embedded system. With the existence of the embedded n

4、etwork, we must take attention to the security. Due to the limitation of the resources of the embedded system, it cant save and circulate large-scale security facilities. Except this, network security technologies are excessively passive defence, which knows little about attackers, not to mention th

5、at it can handle the endless unknown attacks.Honeypot is an active defense technology. It wont bring help to the network security directly, which just collects the information of the attackers and analyzes it. By doing this, then it do some researches to find the attacking methods and loopholes in t

6、he system, so it can also do much help to the network security. With the universality of the application of the embedded networks, the application of the honeypot technology in the embedded system environment is designed in this paper.This paper will firstly introduce the characteristic of the embed

7、ded network security and the honeypot technology and then take the embedded honeypot and embedded honeynet into thought. In several types of typical honeypot products, the paper chose virtual honeypot Honeyd as the research object in the embedded system environment.On the base of analysis of the cri

8、tical technology and general frame of the Honeyd, transplant it into the embedded system, and then propose the extension scheme. At last, the honeypot is deployed and tested in the embedded network environment, and the result shows that embedded honeypot plays a protective effect on the embedded net

9、work security.Keywords: Embedded system; Embedded Netword; Honeypot; Honeyd目 录目 录摘 要IAbstractII第1章 绪 论11.1 研究背景及意义11.2 蜜罐技术研究现状21.3 研究内容及论文结构3第2章 嵌入式网络安全及蜜罐技术52.1嵌入式网络安全52.1.1 嵌入式系统52.1.2 嵌入式网络62.1.3 嵌入式网络安全威胁72.1.4 嵌入式网络安全技术82.2 蜜罐技术102.2.1 蜜罐的概念及分类102.2.2 蜜罐的特点122.2.3 典型蜜罐产品132.3 嵌入式蜜罐142.4 本章小结15

10、第3章 Honeyd框架结构及关键技术研究163.1 Honeyd的框架结构163.1.1 配置数据库173.1.2 数据包分配器173.1.3 协议管理183.1.4 特征引擎183.1.5 可选路由183.2 关键技术193.2.1 虚拟路由拓扑193.2.2 指纹匹配203.2.3 网络数据收集213.2.4 记录日志223.2.5 数据分析223.3 本章小结22第4章 嵌入式系统上Honeyd的移植及扩展234.1移植环境234.1.1 硬件环境234.1.2 软件环境234.2 Honeyd的移植244.2.1 建立编译环境254.2.2 编译基本库文件264.2.3 编译Hone

11、yd274.2.4 交叉编译依赖文件284.2.5 安装Honeyd324.3 Honeyd的扩展方案334.3.1 协议扩展334.3.2 指纹扩展334.3.3 其它扩展344.4 本章小结34第5章 系统部署及测试分析355.1 蜜罐的部署355.1.1 面向阻止的部署355.1.2 面向检测的部署365.1.3 面向响应的部署365.1.4 面向研究的部署365.2 嵌入式网络环境下蜜罐的部署及配置365.2.1 嵌入式蜜罐的部署375.2.2 嵌入式蜜罐的配置375.3 蜜罐系统的启动395.4 系统测试415.4.1 连通性测试415.4.2 操作系统识别测试425.4.3 模拟服

12、务测试435.4.4 路由拓扑测试455.5 数据分析455.6 本章小结46结 论47参考文献48附 录50攻读硕士学位期间发表的学术论文51致 谢52CONTENTSCONTENTSAbstract(Chinese)IAbstract(English)IIChapter 1 Introduction11.1 Research background and signification11.2 Research status of Honeypot technology21.3 Research contents and paper structure3Chapter 2 Embedded n

13、etwork security and honeypot technology52.1 Embedded Network security52.1.1 Embedded system52.1.2 Embedded Network62.1.3 Security threats about Embedded Network72.1.4 Embedded network security technology82.2 Honeypot technology102.2.1 Concept and classification of honeypot102.2.2 Characteristics of

14、honeypot102.2.3 Typical honeypot products132.3 Embedded honeypot142.4 Summary15Chapter 3 Study on architecture and key technology of honeyd163.1 Architecture of honeyd163.1.1 Configuration database173.1.2 Packet dispatcher173.1.3 Services183.1.4 Personality engine183.1.5 Routing183.2 Key technology

15、of honeyd193.2.1 Virtual routing topology193.2.2 Fingerprint203.2.3 Network data collection213.2.4 Recorded log223.2.5 Data analysis223.3 Summary22Chapter 4 The transplant and expansion of honeyd base on embedded system234.1 Transplant environment234.1.1 Hardware environment234.1.2 Software environment234.2 Transplant of honeyd244.2.1 Building compiling environment254.2.2 Compile basic libraries264.2.3 Compile hon

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 学术论文 > 毕业论文

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号