1 / 139
文档名称:

黑客监控技术地研究.pdf

格式:pdf   页数:139
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

黑客监控技术地研究.pdf

上传人:beny00001 2016/4/3 文件大小:0 KB

下载得到文件列表

黑客监控技术地研究.pdf

相关文档

文档介绍

文档介绍:幽北r:业大学博士学位论文——黑客监控技术研究术,设计了基于面向对象离散事件驱动的网络仿真系统框架。在Honey Pot和两种诱骗技术的基础上,的欺骗空间技术,提高了欺骗质量。在黑客监控技术理论成果的指导下,成功研制出黑客监控系统。该系统已通过国家863专家组的验收和国防科工委组织的成果鉴定,并在多家企事业单位试用,取得了较为满意的效果。论文在最后论述了黑客监控系统的设计、实现、部署、评估、技术总结等内容。关键词:黑客监控,入侵检测,黑客诱骗,网络仿真,攻击模式,数据融合数据挖掘~II~ ABSTRACT This paper issupposed by the National High Technology Research and Development Program ofChina(863 Program)under contact and the Research Fund of National Education Ministry under contract No. 2001069901 Wlm thedevelopment work attack and defense Detection System(IDS),as anew active,dynamic defense technology,es the hot area work ,the existing IDSs stillhave many work security more perfectly,this paper presents theconcept as“Hacker Monitoring System”. TIlispaper focuses on theacademic research ofHacker Monitoring Technology andthedevelopment ofHacker Monitoring System,including: (1)This paper presents the“Hacker MonitoringSystem(HMS)”concept forthe firsttime,which isdifferentfrom thepopular is acomprehensive defense system,integrating thereal time intrusion detection,alert,response,counterattack, hacker puter forensics andsecurityassessment,thus formsmultilayer, stereo,active monitoring pared withpureIDS,HMS can not only monitor and trap hackers inreal—timemode,but alsoprovide theactiveand reliable defense monitoring mechanism ofHMS iseffective both on inside,outsideandpotential theproblems which IDS can nothandle thepotential andinsidehackers are solved. (2)On the basis ofstudies ofaRack behaviors,a Vulnerability Description Language(VDL)is designed to solve the problems of existing vulnerability description methods such asenumeration andCVE. (3)To make the taxonomy more scientificand useful,this paper presents a vulnerability taxonomy based on the the characters ofthe stamet,the taxonomy builds allvulnerabilities into a7-D dataspace with specific granularities ,using datamining on themult