Font Size: a A A

Research And Implementation Of Intrusion Detection System

Posted on:2004-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z G GengFull Text:PDF
GTID:2168360092492060Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapidly development of network technology, many conveniences have been brought to people. The roles of network have become more and more important, meanwhile, the security problems of network come into being. With the increasing and convenience of attacking tools, the events of attacking have taken the tendency of rapidly enhancing.The traditional means of security cannot satisfy the demand for development of modern network security. Passive defense firewall system has not kept up with current position, intrusion detection system (IDS) , with the characteristic of active defense can make up the shortage of firewall system.The EDS is used for intrusion action. By collecting and analyzing the information of key position of network or system, it can find the actions of violating security policy and detecting the traces of being attacked from network or system. The IDS has a lot of intelligence, it correlates artificial intelligence closely. It is the combination of computers science, mathematics and so on. It includes many advanced techniques of current computer field, such as data mining,neural network,etc. So the research for IDS means the research for other techniques too. The research of IDS is in developing, there is much work can be done.Based on a great deal of research for the IDS technique, this paper described an mixed IDS. It has distributed framework, and it can be central managed too. It uses cooperative autonomy agent technique. Also, this paper offered a design and resolve scheme for every composing part, includes scanner, Host-based IDS, Network-based IDS and IDS integration with the firewall system. This paper described the technique of realizing for some portion also.
Keywords/Search Tags:network security, intrusion detection, agent, cooperation
PDF Full Text Request
Related items