浏览全部资源
扫码关注微信
1. 国网浙江省电力有限公司,浙江 杭州 310007
2. 国网浙江省电力有限公司丽水供电公司,浙江 丽水 323000
3. 国网浙江省电力有限公司衢州供电公司,浙江 衢州324000
[ "陈利跃(1973-),男,国网浙江省电力有限公司高级工程师、科技信息部信息处处长,主要研究方向为信息技术。" ]
[ "倪阳旦(1986-),男,国网浙江省电力有限公司工程师,主要研究方向为网络安全技术和信息技术。" ]
[ "孔晓昀(1969-),女,国网浙江省电力有限公司教授级高级工程师,主要研究方向为信息技术。" ]
[ "周升(1985-),男,国网浙江省电力有限公司高级工程师,主要研究方向为网络安全技术。" ]
[ "黄慧(1983-),男,国网浙江省电力公司丽水供电公司高级工程师,主要研究方向为网络与信息安全。" ]
[ "郑星(1980-),男,国网浙江省电力公司衢州供电公司高级工程师,主要研究方向为信息系统、安全、信息系统运维、信息化项目建设。" ]
网络出版日期:2018-11,
纸质出版日期:2018-11-20
移动端阅览
陈利跃, 倪阳旦, 孔晓昀, 等. 面向移动网络环境的智能协同蜜网设计与性能分析[J]. 电信科学, 2018,34(11):156-165.
Liyue CHEN, Yangdan NI, Xiaoyun KONG, et al. Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment[J]. Telecommunications science, 2018, 34(11): 156-165.
陈利跃, 倪阳旦, 孔晓昀, 等. 面向移动网络环境的智能协同蜜网设计与性能分析[J]. 电信科学, 2018,34(11):156-165. DOI: 10.11959/j.issn.1000-0801.2018278.
Liyue CHEN, Yangdan NI, Xiaoyun KONG, et al. Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment[J]. Telecommunications science, 2018, 34(11): 156-165. DOI: 10.11959/j.issn.1000-0801.2018278.
在移动网络环境下,因各移动蜜罐资源有限、攻击注入手段灵活多变,需要动态部署蜜网以协同地检测攻击行为特征。然而现有蜜网易遭受特征识别攻击、网内恶意流量肆意传播、不能跨蜜罐迁移连接。为此,基于软件定义网络(software defined networking,SDN)技术,设计了一种智能协同蜜网(intelligent and collaborative Honeynet,ic-Honeynet)系统。它由逆向连接代理模块和蜜网控制器组成,它的优势在于逐一克服了上述3个缺陷。最后,搭建了一个ic-Honeynet实验环境,并验证了该系统的有效性。实验结果表明:该系统吞吐量近乎线速,高达8.23 Gbit/s;响应时延额外增加很小,仅在0.5~1.2 ms区间变化;连接处理能力也很强,可高达1 473个连接/s。
In the mobile network environment
the mobile honeypot resources are limited and the attack injection means are flexible
so it is necessary to dynamically deploy the honeynet to collaboratively detect the attack behavior characteristics.However
existing honey nets are susceptible to feature recognition attacks
malicious traffic within the network
and can’t be migrated across honeypots.Based on software defined networking (SDN) technology
an intelligent collaborative honeynet system (ic-Honeynet) was designed.It consisted of a reverse connection proxy module and a honeynet controller.Finally
an ic-Honeynet experimental environment was built and the effectiveness of the system was verified.The experimental results show that the throughput of the system is nearly linear
up to 8.23 Gbit/s; the additional increase in response delay is small
only in the range of 0.5 to 1.2 ms; the connection processing capability is also very strong
up to 1 473 connections/s.
贾召鹏 , 方滨兴 , 刘潮歌 , 等 . 网络欺骗技术综述 [J ] . 通信学报 , 2017 , 38 ( 12 ): 128 - 143 .
JIA Z P , FANG BX , LIU C G , et al . Survey on cyber deception [J ] . Journal on Communications , 2017 , 38 ( 12 ): 128 - 143 .
诸葛建伟 , 唐勇 , 韩心慧 , 等 . 蜜罐技术研究与应用进展 [J ] . 软件学报 , 2013 , 24 ( 4 ): 825 - 842 .
ZHUGE J W , TANG Y , HAN X H , et al . Honeypot technology research and application [J ] . Journal of Software , 2013 , 24 ( 4 ): 825 - 842
THOMPSON M F . Effects of a honeypot on the cyber grand challenge final event [J ] . IEEE Security & Privacy , 2018 , 16 ( 2 ): 37 - 41 .
JIA Z P , CUI X , LIU Q X , et al . Micro-Honeypot:using browser fingerprinting to track attackers [C ] // 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC),June 18-21,2018,Guangzhou,China . Piscataway:IEEE Press , 2018 : 197 - 204 .
KUMAR S , SEHGAL R , BHATIA J S . Hybrid honeypot framework for malware collection and analysis [C ] // 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS),Aug 6-9,2012,Chennai,India . Piscataway:IEEE Press , 2012 : 1 - 5 .
CHRISTOS K . Improving mobile core network security with Honeynets [J ] . IEEE Security & Privacy , 2007 , 5 ( 4 ): 40 - 47 .
ZAKARIA W Z , MAKSOM F M , ABDULLAH K . Observing the presence of mobile malwares using low-interaction honeypot [C ] // 2016 IEEE Symposium on Computer Applications &Industrial Electronics (ISCAIE),May 30-31,2016,Batu Feringghi,Malaysia . Piscataway:IEEE Press , 2016 : 117 - 121 .
SONG Y B , ZHU X Y , HONG Y L , et al . A mobile communication honeypot observing system [C ] // 4th International Conference on Multimedia Information Networking and Security,Nov 2-4,2012,Nanjing,China . Piscataway:IEEE Press , 2012 : 861 - 865 .
ASIT M , TAPASWI S . A software router based predictive honeypot roaming scheme for network security and attack analysis [C ] // 9th International Conference of Innovations in Information Technology(IIT),March 17-19,2013,Paphos,Cyprus.[S.l.:s.n . ] , 2013 : 221 - 226 .
ELIOT N , KENDALL D , BROCKWAY M . A flexible laboratory environment supporting honeypot deployment for teaching real-world cybersecurity skills [J ] . IEEE Access , 2018 ( 6 ): 34884 - 34895 .
邵艾青 , 毕喜军 , 庞浩 . 蜜罐系统与安管平台联动结合的研究与实践 [J ] . 电信科学 , 2017 , 33 ( Z2 ): 256 - 261 .
SHAO A Q , BI X J , PANG H . Research and practice of the combination of honeypot system and security management platform [J ] . Telecommunications Science , 2017 , 33 ( Z2 ): 256 - 261 .
0
浏览量
857
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构