| With the rapid development of Internet technology, more and more services are provided by network. When people enjoy the convenience of the network, it also has many challenges in the network safety by the attacking of all kinds of network and the virus spreading. So how to construct a dependable network safety system has been a problem which we must instantly think of it. Nowadays there are several network safety technology such as:the technology of firewall and IDS which are the passive defense measure. With the new attacking technology, this network safety technology will be always in the passive position.Detailed instructing an active defense technology—honeypot which can remedy the insufficiency of the tradition network safety technology at the confrontation and founding the unknown attacking. The honeypot is a network trap technology which can attract the attack through the true or simulated network and service. The honeypot can also acquire the active date of the attacking network and even for the attacking network’s aim and deed. Instruct the honeypot production and analyze their advantage and shortage in the paper.Mainly research the dynamic honeypot based on virtual Honeyd. Instruct the logical framework structure and the advantage and shortage of the installation and configuration of the dynamic honeypot. Improve the Honeyd through the combination of the advantage of the other technology. Mainly research how to realize the function that it can give alarm for sending the date of the attacking network to the appointing e-mail which the network supervisor can accurately and promptly receive.A virtual trap dynamic honeypot system is designed, with the improved Honeyd to simulate a lot of virtual honeypot. It can also up-grate the honeypot system’s fraudulence which defend the true system, with Vmware to dummy several operating system. It is strictly supervised by the honeypot system with IPTables firewall which complete the invading supervise and date gaining by the combination of the Snort and Seback software, to protect hacker’s attack to other computer. Considering the importance of the information of founding hackers, we put forward a solution by the transferring of the important system log’s back-up to insure its safety. At last apply the system to the supervise of internet safe manage in the campus, the result shows that the system can cheat hacker well and check the un-known attacking deed by the arrangement and testing in the school’s internet. It can also write the attaking information by hackers, so it achieves the designed aim. |