J4

Previous Articles     Next Articles

Performance Improvement of NIDS with Honeypot

LIU Xiao-yang1, FANG Zhi-yi2, ZHAI Yu-jia2, YUAN Long-lue2   

  1. 1. College of Software, Jilin University, Changchun 130012, China; 2. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2005-06-20 Revised:1900-01-01 Online:2006-01-26 Published:2006-01-26
  • Contact: FANG Zhi-yi

Abstract: Combining the characteristics of Honeypot with those of NIDS, we constructed Honeytoken bait data according to data secrecy need of information system and expand NIDS security application module. Through monitoring Honeytoken bait data, tracking in real time and analysing invader’s illegal invasion behavior and invasion intention, send out the alarm to the system makes the system manager perfect the secrecy policy of the sensitivity data so as to guarantee the security of resources of the data.

Key words: Honeypot, NIDS, data secrecy

CLC Number: 

  • TP393