Font Size: a A A

Network Intrusion Detection System Design And Implementation

Posted on:2009-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y F WuFull Text:PDF
GTID:2178360248956684Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Invade inspecting up the detecting technology is one kind of network safety technology , it is one kind of active tactics-based network fail-safe system, be to that tradition safety tactics complement, important component in being network fail-safe system. Invade detecting already becomes the indispensable part of network safety , it defense a tier for the network has provided one , we can define possible invasion in advance to exercise the system administrative person carrying out the notice guarding , discovering invasion in possibility as if it be behavior to be to return to warning right away to the network behavior in this one tier. The main body of a book with network data-based security, comment that invade check the systematic basic concept. Discuss and the technology how union IDS now has , introduce a network invade check the systematic model.Intrusion Detection: Seeing the name of a thing one thinks of its function , be face to face invade the behavior coming to know. It passes the analysis collecting information and being in progress to the person to getting some strategic point in the computer network or computer system, Be in progress invade the software checking and the hardware combination be invade check system. Being different from other safe product, invade detecting system needs more intelligence , it must can carry out analysis with the data , reach and useful result. Qualified invasion of one checks system energy greatly facilitate on-time of the administrative person, safe guarantee network operationThe article has set forth several the following aspect mainly: Invade relevance concept checking, has had knowing to be therefore likely to study more well to attack invade check a technology; Know main invasion then checking a technology: Act for and move detecting , statistical method , agreement analysis , neural networks acting for the technology , pattern matching , state; The species having introduced one finally is invaded owing to network computer checking system: Network invade check systematic design , be system's turn to have a detailed attack model regulation warehouse, the technology wielding various detecting, has detecting efficient , occupies few , expansion resource nature regards , completeness , oneself security , simple characteristic easy to use.
Keywords/Search Tags:Intrusion Detection System, Invade respond to, Leak, Attack by agreement
PDF Full Text Request
Related items