Please wait a minute...
New Technology of Library and Information Service  2011, Vol. 27 Issue (2): 94-99    DOI: 10.11925/infotech.1003-3513.2011.02.15
article Current Issue | Archive | Adv Search |
CPot Honeypot System in Library Network Applications
Zhu Xiaodong
Library of College of Science and Technology,Hunan University of Technology, Zhuzhou 412000, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

The paper presents a distributed honeypot system CPot(Click-based honeyPot) which fuses network telescope and intrusion detection.The author deploys CPot in a virtual digital library which is connected to public network, and carries out half a year of test in library security system. The result proves that CPot can increase the security of digital library and has a high practical value in library security.

Key wordsClick router      Honeypot      Network telescope      Traffic analysis      Digital library     
Received: 07 January 2011      Published: 25 March 2011
: 

G250.76

 

Cite this article:

Zhu Xiaodong. CPot Honeypot System in Library Network Applications. New Technology of Library and Information Service, 2011, 27(2): 94-99.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2011.02.15     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2011/V27/I2/94


[1] Spitzner L. The Honeynet Project: Trapping the Hackers
[J]. IEEE Security & Privacy,2003, 1(2):15-23.

[2] Spitzner L. Honeypots: Tracking Hackers
[M].邓云佳译.北京:清华大学出版社,2004.

[3] Zhuge J, Holz T, Han X, et al. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots .In: Proceedings of the 9th International Conference on Information and Communications Security.Berlin, Heidelberg:Springer-Verlag, 2007:438–451.

[4] Moore D. Network Telescopes: Observing Small or Distant Security Events . . http://www.caida.org/publications/presentations/2002/usenix_sec/.

[5] Kohler E. The Click Modular Router . . http://www.pdos.lcs.mit.edu/papers/click:kohler-phd/thesis.pdf.

[6] Müter M, Freiling F, Holz T, et al. A Generic Toolkit for Converting Web Applications into High-Interaction Honeypots . . http://people.clarkson.edu/~jnm/publications/honeypot-raid2007.pdf.

[7] Vrable M, Ma J, Chen J, et al. Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm . In: Proceedings of the 2005 Symposium on Operating Systems Principles. New York, NY, USA:ACM,2005:23-26.

[8] Jung J, Paxon V, Berger A W, et al. Fast Portscan Detection Using Sequential Hypothesis Testing . In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California,USA. 2004: 211-225.

[1] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[2] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[3] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[4] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[5] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[6] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[7] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
[8] Hu Changping, Chen Guo. A New Feature Selection Method Based on Term Contribution in Co-word Analysis[J]. 现代图书情报技术, 2013, 29(7/8): 89-93.
[9] Wang Zhongyi, Xia Lixin, Shi Yijin, Zheng Senmao. The Creation and Publishing of Middle Linked Data in Digital Library[J]. 现代图书情报技术, 2013, (5): 28-33.
[10] Liu Wei, Xia Cuijuan, Zhang Chunjing. Big Data and Linked Data: The Emerging Data Technology for the Future of Librarianship[J]. 现代图书情报技术, 2013, (4): 2-9.
[11] Zhou Shanshan, Bi Qiang, Gao Junfeng. A Method of Information Retrieval Results Visualization Based on Social Network Analysis[J]. 现代图书情报技术, 2013, 29(11): 81-85.
[12] Chen Junjie, Huang Guofan. Construction Strategy and Main Technology of the Mobile Library APP——Take iOS for Instance[J]. 现代图书情报技术, 2012, (9): 75-80.
[13] Dong Li, Zeng Ting, Chen Wu, Jiang Airong. A Review of ICADL 2011[J]. 现代图书情报技术, 2012, 28(7): 33-39.
[14] Qiao Jianzhong. Statistical Characteristics Based Web Page Relevance Judgment Strategy for the “Type” Topics Crawled[J]. 现代图书情报技术, 2012, 28(6): 9-16.
[15] Liu Jiantao. Implement of Translation and Interpretation Bookmarklet in Library Based on Cloud Service[J]. 现代图书情报技术, 2012, 28(6): 84-88.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn