陷阱系统

  • 网络Trap system;honeypot;deception system
陷阱系统陷阱系统
  1. 该程序先检测入侵黑客,定向到陷阱系统,并自动加载IP定位程序到黑客电脑,将黑客IP地址等信息直接发送到日志代理服务器,解决密钥失效问题。

    Intrusion hacker is tested and located with intrusion locating program , redirecting it to honeypot system , and automatically loads IP address locating program to PC of the hacker . It 's aimed at resolving encryption key problem by sending hacker 's IP address directly to logging proxy server .

  2. 网络诱骗与陷阱系统Honeypot

    Network Cheating and Trap System Honeypot

  3. 而陷阱系统的应用能弥补这些不足,增强网络的安全性。

    But the Snare System can do well in these aspects .

  4. 基于网络层的虚拟陷阱系统的分析与实现

    Analyse and Implementation of Virtual Trap System Based on Network Level

  5. 对攻击者来说陷阱系统有一定的吸引力,但是该系统上没有有价值的数据。

    The decoy system appears to be an attractive target to an attacker , but does not usually contain valuable data .

  6. 根据这个模型,初步实现了基于linux内核的陷阱主机系统。

    According to the model , using the Linux system kernel , I developed a decoy host system .

  7. 在陷阱网络系统中增加入侵定位模块、置入入侵定位程序。

    Intrusion locating detection module and intrusion locating program was added in honeypot network system .

  8. 流量标本和IP陷阱是DIDAPPER系统所提出的新概念.它们可以获取和识别异常的流量数据,而且适合于检测大规模网络攻击行为。

    Traffic specimens and IP traps are DIDAPPER 's new concepts , which can capture and recognize abnormal traffics and are suitable for monitoring the large scale network attacks .

  9. Honeypot是一个网络陷阱或欺骗系统,它可以诱惑攻击者,使他们将时间和资源都花费在攻击Honeypot上,从而保护工作系统免于攻击。

    Honeypot is a network trap or a decoy system . It can lure attackers and have them spend time and resource attacking honeypot , protecting production resources from attack .

  10. 这并不是一条电围墙,它也没有任何陷阱或者报警系统。

    It 's not an electrified fence , nor does it have any traps or even alarms .

  11. 采用备用存储数据及软件陷阱等方法提高系统的安全性与抗干扰能力。

    By using back-up stored data , software trap and other methodes , the anti-interference ability and safety of the system is increased .

  12. 本文以目前陷阱技术的研究为基础,结合目前的防火墙和入侵检测技术,设计了一个陷阱系统模型。

    In this paper , a model of decoy system is designed , which is basis of recent study of decoy technology and use firewall and intrusion detection .