Honeypot: a supplemented active defense system for network security

Author(s):  
Feng Zhang ◽  
Shijie Zhou ◽  
Zhiguang Qin ◽  
Jinde Liu
CONVERTER ◽  
2021 ◽  
pp. 45-51
Author(s):  
Zhaofang Du

This paper studies a new network information security system and its evaluation method based on the security threat situation network security model. This paper expounds the application of active defense system and passive defense system in network security, and uses advanced technical support platform and network security model. In this paper, the active defense system and the passive defense system are organically combined to form a new model of computer network security with characteristics. At the same time, based on the idea of security threat situation evaluation, this paper extends the traditional PDRR security model and proposes a network active defense security model and defense in depth security strategy. On this basis, a hybrid architecture of active and passive defense is proposed. The architecture integrates some new network active defense technologies, and constructs a comprehensive and deep network defense system together with network passive defense means. The experimental results show that the proposed defense model improves the security defense efficiency and effective defense rate of the traditional PDRR security model.


2009 ◽  
Vol 32 (4) ◽  
pp. 817-827 ◽  
Author(s):  
Wei JIANG ◽  
Bin-Xing FANG ◽  
Zhi-Hong TIAN ◽  
Hong-Li ZHANG

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Vol 13 (7) ◽  
pp. 1262
Author(s):  
Leyi Shi ◽  
Shanshan Du ◽  
Yifan Miao ◽  
Songbai Lan

With the development of satellite communication networks and the increase of satellite services, security problems have gradually become some of the most concerning issues. Researchers have made great efforts, including conventional safety methods such as secure transmission, anti-jamming, secure access, and especially the new generation of active defense technology represented by MTD. However, few scholars have theoretically studied the influence of active defense technique on the performance of satellite networks. Formal modeling and performance analysis have not been given sufficient attention. In this paper, we focus on the performance evaluation of satellite network moving target defense system. Firstly, two Stochastic Petri Nets (SPN) models are constructed to analyze the performance of satellite network in traditional and active defense states, respectively. Secondly, the steady-state probability of each marking in SPN models is obtained by using the isomorphism relation between SPN and Markov Chains (MC), and further key performance indicators such as average time delay, throughput, and the utilization of bandwidth are reasoned theoretically. Finally, the proposed two SPN models are simulated based on the PIPE platform. In addition, the effect of parameters on the selected performance indexes is analyzed by varying the values of different parameters. The simulation results prove the correctness of the theoretical reasoning and draw the key factors affecting the performance of satellite network, which can provide an important theoretical basis for the design and performance optimization of the satellite network moving target defense system.


2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.


2021 ◽  
Vol 2074 (1) ◽  
pp. 012041
Author(s):  
Rui Wang ◽  
Yingxian Chang ◽  
Lei Ma ◽  
Hao Zhang ◽  
Xin Liu ◽  
...  

Abstract Now the computer has been completely towards the public, the network in daily life is more and more widely used, but at the same time, the potential network security problems are also more and more serious. Some sophisticated computer people in order to make money, crack other personal users or company information, a variety of network attacks one after another. Cyber attack has become an extremely feared existence for ordinary people because of its wide range of attacks, strong attack force and obvious hiding effect, which seriously threatens the security of personal information network. If attacked by this kind of attack, the loss borne by each person or company is immeasurable. In order to maintain network security, the defense system is also improving day by day, and finally presents software. This paper mainly makes a detailed understanding of the border attack and defense system, and analyzes the main reasons and inevitability of the software of the border attack and defense system.


Sign in / Sign up

Export Citation Format

Share Document