Font Size: a A A

The Implementation And Performance Optimization Of IPv6 Intrusion Detection System

Posted on:2007-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:K P WangFull Text:PDF
GTID:2178360185968225Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Over the past several years, the technology of Internet is developed at full speed worldwidely. But for the TCP/IP and HTTP FTP etc. application protocols was created in a time and place where security wasn't a very strong concern, this make the TCP/IP network lack even the most basic mechanisms for security.The Intrusion Detection System inspects the contents of network traffic to look for and deflect possible attacks. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure.With the IPv6 development, especially during the course of transition from IPv4 to IPv6, there are many new problems to be faced and need to be solved when doing research on IPv6 intrusion detection. The early developped IPv4 intrusion detection systems cannot prevent this type of attacks efectively. Now by far the research of IPv6 Intrusion Detection System is still a blank. Therefore, the study on IPv6 intrusion detection systems has high theoretic importance and practical value.The research emphases of this thesis is focused on how to implement IPv4/IPv6 dual stack intrusion detection system and the way to optimize the performance of it. We also propsed a solution of how to build up IPv4/IPv6 dual stack intrusion detection system to protect the high speed IPv4/IPv6 network. Our experimental results indicate that the IPv4/IPv6 dual stack intrusion detection system we implemented and optimized reach the gigabit IDS test criteria怂The implemented IPv4/IPv6 dual stack intrusion detection system have the capability for realtime intrusion detection on gigabit networks.The paper is organized as follows: at the first two chapters, the thesis...
Keywords/Search Tags:IPv6 network security, Intrusion detection, Data capture, Packet analysis, Software optimization, Multiple-pattern matching
PDF Full Text Request
Related items