Another approach used by the community is deploying "honeypots". 另一种常被社区采用的方式是部署“honeypot”。
You'll find honeypots, firewalls, IDS, and several network utilities to help you map your heterogeneous network better. 您会发现“粘蜜罐”、防火墙、IDS以及一些网络工具可帮助您更好地映射异构网络。
The dynamic honeypot is a kind of plug and play system by using passive fingerprinting and virtual honeypots. 该蜜罐系统主要使用了被动指纹识别技术和虚拟蜜罐技术。
The results of research show that dynamic honeypot can radically revolutionize the deployment and maintenance of honeypots. 研究结果表明,动态蜜罐能够从根本上解决蜜罐在配置和维护上存在的问题。
In the future, we hope to develop more advanced honeypots that help us to gather information about threats such as botnets. 将来,我们希望开发更高级的蜜罐来帮助我们收集关于像僵尸网络这样的威胁。
Using honeypots to detect and monitor malware behaviors for network security trend analysis and early warning has become a new research direction. 利用蜜罐技术监控网络恶意行为从而分析网络安全趋势和对攻击行为进行早期预警已成为网络安全领域的一个新研究方向。
A Safety Model for Electric Power Information Network Based on "Honeypots" Technologies 基于蜜罐技术的电力信息网络安全模型
Application and Research on Honeypots in Intrusion Detection& Response 蜜罐系统在入侵检测与响应中的研究与应用
Research and Development of Honeypots 蜜罐研究与进展
Honeypots present the dedicated application system intended to be attacked, so we can conveniently record the hackers 'activities, know attack methodologies, and recognize potential threats. 它设置一个专门让黑客攻击的应用系统,以记录黑客的活动,便于我们了解黑客的攻击方式和手段,发现潜在的威胁。
But honeypots are applicable for a certain conditions, and the essential benefit can be achieved only when the requisite technique, manpower, time, equipment and goals are in existence. 但是蜜罐的应用需要一定的条件,只有在具备了必要的技术、人力、时间、设备和目的的地方,才可能得到实实在在的好处。
Thirdly, our warning system is composed of high interaction honeypots, low interaction honeypots and console, so their relevant configuration will be introduce in detail, and the entire configuration process and parameter settings will be demonstrated. 第三,详细说明了预警系统三大模块高交互蜜罐区、低交互蜜罐区以及中控台的相关配置,并演示了整个配置流程和参数设置。
High-interaction honeypots which can respond to zero-day attacks will grasp the manner and process of network attack more clearly, the low-interaction honeypots which is convenient maintenance and easy deployment can easily capture independent propagation of malicious code. 高交互蜜罐能够更加清晰的把握攻击方式与流程,并可应对零日攻击。低交互蜜罐可以方便的捕获自主传播的恶意代码,而且维护与部署方便。
In format honeypots this was often impossible, because malevolent and benevolent traffic could not be distinguished. 然而这一点对以前的蜜罐来说是不可能的,因为恶意的和无害的流量不能被区别开来。
Then, the theoretic study of honeypots is made, including level of involvement, information collecting and protecting thirty parties to limit risks. 在此基础上,对蜜罐系统的各种理论做出了研究,包括它的交互级别、信息收集的方式和对第三方的保护以限制风险。