Constitute the passive infrastructure in network
Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74360793/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network system with active technology, make use of decoy sever to allure and track the attackers. In the procedure, a data analysis model is also brought out. It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology. |
---|---|
ISSN: | 1000-436X |