Font Size: a A A

Design And Implementation Of Distribute Intrusion Detection System

Posted on:2007-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2178360185973806Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of INTERNET in modern society, intrusion attack, denial of service attack, misuse of INTERNET resource, bring many negative effects to the common use. There is one solution can give us some good things to solve this, that is intrusion detection system—IDS. Considering the IDS costs too much, I give one solution here based on the SNORT IDS which is free. The SNORT IDS is a free, powerful, and effective intrusion detection system, and it can handle almost every field of IDS, ranging from family use to enterprise use.In the first section of paper, I describe the basis of computer security, and those items like virus, Trojan, worm, human attack, etc, also showed in this paper.In second part, I show the difference of network intrusion system (NIDS), host intrusion detection (HIDS), and distribute intrusion detection (DIDS). At the same time, the good aspects and bad aspects of the three IDS showed in this section.On the third part, I create one solution of DIDS named XIDS, which means experiencing intrusion detection system. The XIDS is based on the SNORT IDS. With many plug-INS, the XIDS can handle, analysis the information sniffed from many SNORT agents established in the monitored network, store the tracks of intruders, and alert the administrator to focus.Finally, I also describe some shortcomings of XIDS, and discuss the future of IDS.
Keywords/Search Tags:intrusion detection system, IDS, distribute, SNORT, agent
PDF Full Text Request
Related items