{"title":"基于蜜罐技术的入侵检测系统","authors":"L. Dongxia, Zhang Yongbo","doi":"10.1109/ICCSEE.2012.158","DOIUrl":null,"url":null,"abstract":"This paper presents an intrusion detection module based on honey pot technology, which utilizes IP Trace back technique. By using the mobile agents, this module has the capability of distributed detection and response, the whole detection module can be extended with convenience and be configured dynamically and flexibly. By using honey pot technology, this module traces the intrusion source farthest.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"495 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"An Intrusion Detection System Based on Honeypot Technology\",\"authors\":\"L. Dongxia, Zhang Yongbo\",\"doi\":\"10.1109/ICCSEE.2012.158\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an intrusion detection module based on honey pot technology, which utilizes IP Trace back technique. By using the mobile agents, this module has the capability of distributed detection and response, the whole detection module can be extended with convenience and be configured dynamically and flexibly. By using honey pot technology, this module traces the intrusion source farthest.\",\"PeriodicalId\":132465,\"journal\":{\"name\":\"2012 International Conference on Computer Science and Electronics Engineering\",\"volume\":\"495 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Computer Science and Electronics Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSEE.2012.158\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computer Science and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSEE.2012.158","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Intrusion Detection System Based on Honeypot Technology
This paper presents an intrusion detection module based on honey pot technology, which utilizes IP Trace back technique. By using the mobile agents, this module has the capability of distributed detection and response, the whole detection module can be extended with convenience and be configured dynamically and flexibly. By using honey pot technology, this module traces the intrusion source farthest.