首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于OpenFlow的蜜罐主动取证技术
引用本文:杨天识,刁培金,梁露露,常震.基于OpenFlow的蜜罐主动取证技术[J].北京理工大学学报,2019,39(5):545-550.
作者姓名:杨天识  刁培金  梁露露  常震
作者单位:中国信息安全测评中心,北京,100085;北京中测安华科技有限公司,北京,100085;中国科学技术大学,安徽,合肥 230027
基金项目:国家"八六三"计划项目(2015AA16001)
摘    要:提出了一种方法,将攻击流量自动从真实的云计算服务器中隔离到蜜罐服务器中.通过创建一个蜜罐网络服务器的虚拟机,使蜜罐服务器配备与真实云计算服务器相同的内存和存储设备,并通过OpenFlow控制和监控网络流量,从而将蜜罐系统与真实云服务器隔离开来.当访客正常访问服务器时,交换机会将访客的访问请求路由到真实的服务器.当某个访客被IDS标记为可疑攻击者时,交换机会重新计算路由路径,将攻击者的请求路由到制定的蜜罐中. 

关 键 词:云计算  OpenFlow控制  蜜罐系统
收稿时间:2017/7/30 0:00:00

Active Forensics Technology of Honeypot Based on OpenFlow
YANG Tian-shi,DIAO Pei-jin,LIANG lu-lu and CHANG Zhen.Active Forensics Technology of Honeypot Based on OpenFlow[J].Journal of Beijing Institute of Technology(Natural Science Edition),2019,39(5):545-550.
Authors:YANG Tian-shi  DIAO Pei-jin  LIANG lu-lu and CHANG Zhen
Institution:1. China Information Technology Security Evaluation Center, Beijing 100085, China;2. Beijing Zhongceanhua Technology Co., Ltd., Beijing 100085, China;3. University of Science and Technology of China, Hefei, Anhui 230027, China
Abstract:To provide customers with Internet remote services, cloud computing focuses on a large number of computing resources, storage resources and software resources. As cloud computing users, information resources are highly centralized, so the risk of cloud computing security incidents is much higher than the traditional application. Honeypot system can effectively capture the cloud traffic in the attack traffic. However, it is still difficult to develop seductive, protective, and deceptive honeypot systems for cloud computing security development. In this paper, a way was proposed to automatically isolate attack traffic from a real cloud computing server for a honeypot server. The honeypot system was isolated from the real cloud server by creating a virtual machine for a honeypot network server, allowing the honeypot server to have the same memory and storage devices as real cloud computing servers and monitoring the network traffic through OpenFlow. When a visitor visits the server normally, the switch can route the visitor''s access request to the real server. When a visitor is marked as a suspicious attacker by IDS, the switch can recalculate the routing path and route the attacker''s request to the developed honeypot.
Keywords:cloud computing  OpenFlow control  honeypot
本文献已被 万方数据 等数据库收录!
点击此处可从《北京理工大学学报》浏览原始摘要信息
点击此处可从《北京理工大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号