J4
Previous Articles Next Articles
LIU Xiao-yang1, FANG Zhi-yi2, ZHAI Yu-jia2, YUAN Long-lue2
Received:
Revised:
Online:
Published:
Contact:
Abstract: Combining the characteristics of Honeypot with those of NIDS, we constructed Honeytoken bait data according to data secrecy need of information system and expand NIDS security application module. Through monitoring Honeytoken bait data, tracking in real time and analysing invader’s illegal invasion behavior and invasion intention, send out the alarm to the system makes the system manager perfect the secrecy policy of the sensitivity data so as to guarantee the security of resources of the data.
Key words: Honeypot, NIDS, data secrecy
CLC Number:
LIU Xiao-yang, FANG Zhi-yi, ZHAI Yu-jia, YUAN Long-lue. Performance Improvement of NIDS with Honeypot[J].J4, 2006, 44(01): 67-72.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: http://xuebao.jlu.edu.cn/lxb/EN/
http://xuebao.jlu.edu.cn/lxb/EN/Y2006/V44/I01/67
Cited