【正文】
在本文完成之際,我由衷地感謝關(guān)懷、教誨、幫助、支持和鼓勵我完成學(xué)業(yè)的老師、朋友和親人。首先我要感謝我的導(dǎo)師智澤英老師,在整整三個月的學(xué)習(xí)中,無論在資料的收集還是論文的完成過程,導(dǎo)師都在百忙之中給予了幫助和指導(dǎo)。導(dǎo)師不但學(xué)識淵博、治學(xué)嚴(yán)謹(jǐn),更是誨人不倦,導(dǎo)師的作風(fēng)深深的影響了我,使我受益終生。另外,老師的親切與和藹也深深感染了我,讓我慶幸遇上了這么一位優(yōu)秀的導(dǎo)師。我之所以能夠順利地完成論文智老師功不可沒。在此謹(jǐn)向尊敬的導(dǎo)師致以崇高的敬意和衷心的感謝。其次我要感謝太原科技大學(xué)實驗室的各位老師,她們?yōu)槲姨峁┝藢嶒炈璧脑O(shè)備,在上機與程序調(diào)試過程中,她們一直都給予了我細(xì)心的指導(dǎo)和幫助,并提出了許多寶貴的意見和建議,使我得以順利完成本課題的研究。在此表示深情謝意。最后感謝我的父親和母親,他們多年來在生活中對我無微不至的關(guān)懷和學(xué)習(xí)上無私的支持,沒有他們的鼓勵與支持就沒有我的今天,衷心的感謝我的父母。參考文獻(xiàn)[1] Bedford B D,Hoft R G.Principles of Inverter Circuits.New York.John Wileyamp。 Sons,1964.[2] Pitel I J et al,Wood of Programed Waveform Pulse Width .,1980,16(5):705~715[3] Patel H S,Hoft R G。Generalized Technique of Harmonic Elimination and Voltage Control in Thyristor .Ⅰ,(3):310~.Ⅱ,(5):666~673[4] Kernick A,Stechschulte D L,Shireman D Inverter with Synchronus Output Waveform Synthesized by Timeoptimalrespons ,1973,24(4):297~305[5] Kawamura A,Hoft R Feedback Controlled PWM Inverter with Adaptive .,1984,20(4):769~775[6] Gokhale K P,Kawamura A,Hoft R Microprocessor Control of PWM Inverter for Sinsoidal Output Waveform .,1987,23(5):901~910[7] 陳建章,嚴(yán)仰光.不同性質(zhì)負(fù)載下無差拍控制PWM逆變器的研究.電力電子技術(shù) .1996 (3):38~42Know Your Enemy Honeynets in UniversitiesDeploying a Honeynet at an Academic InstitutionHoneynets have demonstrated their value as a research tool in the area of Information Assurance (IA). Many researchers and organizations in the security munity, both public and private, are currently employing honeynets to continue to gather knowledge concerning the tactics, techniques and procedures of the hacker munity. Since the summer of 2002, Honeynet Alliance members at The Georgia Institute of Technology (Georgia Tech) , successfully deployed a honeynet on the internal network to collect information on hackers and to help secure their campus enterprise network. The purpose of this paper is to help academic organizations deploy honeynets in .edu environments by sharing with you their experiences and lessons learned. We assume that you have already read and are familiar with the concepts of a honeynet as discussed in the KYE: Honeynets paper. The deployment of a honeynet on a large enterprise network such as that found on a major college or university can offer numerous benefits to an institution. Based on our experience, we identified two primary benefits. The first is the ability to use the data collected as a teaching and research tool for any type of puter security related course or research that is being offered. Professors and students can potentially use the honeynet as a testing ground for classes or research. In fact, one student recently received his based on our honeynet. The second, and based on our experience the more significant benefit of a honeynet, is it can serve as a network security tool to dramatically increase the overall security posture of that institution39。s network. For example, our honeynet identified over 165 promised systems on the GA Tech networks, providing extensive information what was promised, how, and potentially by whom. Later on in the paper we cover in greater detail the value our honeynet provided GA Tech and its faculty, staff, and students. Getting That Bad Boy Approved Lets say you are interested in the idea of deploying a honeynet on your internal, academic networks, for either research or detection purposes. Where does one start? The first step you need to take is getting approval. A mon concern for academic honeynets is permission。 how do you get institution authorization to deploy this on internal networks? One thing we learned is it is necessary to receive permission from several organizations before establishing a honeynet at a University. This usually involves two things。 demonstrating the value of honeynets and addressing issues concerning legality, security and privacy. These areas must be addressed since you will not own the network in which you will be using to establish your honeynet. You must coordinate with your network administrators and your university administration to ensure that issues previously mentioned are addressed. You do not want to set up a honeynet without your network administrators being aware of it. For value, we initially requested to set up our honeynet for research purposes. Honeynets provide fertile ground for research topics including: databases, distributed agents, data analysis, agent technology, network fundamentals and advanced topics. Additionally, honeynets provide a wealth of data collections for research. However, the honeynet also quickly demonstrated its value in detection, we soon realized its role as part of the university security infrastructure. The value of honeynets extend beyond the research lab and into the system/security administrators toolkit. As detailed later in the paper, the deployment of honeynets at Georgia Tech has significantly increased the cybersecurity posture of the university. The second area to be addressed are the concerns of legality, security and privacy. These are all potential topics for the network administrators and the university administration to use as justification for denying the honeynet deployment and must be addressed up front. It will most likely be necessary to receive permission from the Network Administrators of your campus network in order to establish a honeynet at your institution. Some network administrators may be reluctant to do so fearing that a honeynet will increase the chance of a system promise occurring. We have found the opposite to be true here at Georgia Tech. The honeynet can provide additional analysts to examine suspicious traffic that is occurring within the campus network. If the principle of data control is followed, the danger posed by a honeynet machine being utilized to promise any other campus machines is greatly mitigated. Frequent monitoring of the honeynet data and providing frequent reports of suspicious incidents to the network administrators should put them at ease concerning