(Based on the system structure, simulated routing topology, configuration commands and log functions of the virtual honeypot structure Honeyd, a virtual honeypot system HoneypotV is designed and deployed in a practical network environment. The system builds a honeypot by simulating the TCP/IP stack of the operating system, and selects the database with the same fingerprint as Nmap or Xprobe to simulate the operating system to respond to the network request for the virtual honeypot. It can realize several functions such as deception and abduction, behavior control, intrusion/intrusion detection, passive sniffing and data analysis, and experiments have proved that the expected solution is achieved.
_rels\.rels
.....)