Liu Yaqun, Gao Yazhuo, Xing Changyou, Zhang Guomin. DECEPTION DEFENSE ORIENTED HONEYNET TECHNIQUESJ. Computer Applications and Software, 2024, 41(10): 362-371. DOI: 10.3969/j.issn.1000-386x.2024.10.053
Citation: Liu Yaqun, Gao Yazhuo, Xing Changyou, Zhang Guomin. DECEPTION DEFENSE ORIENTED HONEYNET TECHNIQUESJ. Computer Applications and Software, 2024, 41(10): 362-371. DOI: 10.3969/j.issn.1000-386x.2024.10.053

DECEPTION DEFENSE ORIENTED HONEYNET TECHNIQUES

  • Honeynet deceives the attackers by constructing a trapping environment and masquerading as a real business network. Attracting attackers, monitoring attackers' behavior and analyzing their characteristics have become the trump card of network deception defense. The definition, classification and functions of honeynets were introduced. On this basis, combining the attack protection process of honeynets, the existing research results were analyzed and concluded according to the key technologies of honeynets, such as generation and deployment of deception scenarios, attack trapping, attack behavior analysis, and security enhancement. In addition, the effect and research progress of the above-mentioned key technologies were discussed in detail and the existing problems and shortcomings in the existing honeynet research were summarized. The development trend and challenge in the future were prospected.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return