Font Size: a A A

Analysis And Application Of Linux Intrusion Detection System

Posted on:2006-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:S HuFull Text:PDF
GTID:2168360155964907Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Intrusion Detection System is the necessary supplementary of firewall. Through collect information and analyse it to computer network or several key of computer system to their, fmd the network from it or violate the behavior of the safe tactics and sign attacked in the system. Different from other safe products, it needs more intelligence to invade the detection system, it can analyse the data got, and draw the useful result. It is can greatly in detection system in one piece invasion that is qualified simplify by job of administrator, guarantee the operation of the online security.In recent years , no matter from the scale and method , have invaded technology and all changed. Meanwhile, new invasion means and technology are in the constant appearance. So, it needs constant expansion and upgrades to invade the detection system.This text has introduced the concept and principle of invading the detection system at first, more existing invasion measures the pluses and minuses of the products, then regard invading detection system Snort in lightweight as models , analyse the system structure and workflow of Snort system, to present and popular invasion technology finally, the relevant rules of the analysis on network data and record have been expanded and realized .
Keywords/Search Tags:Intrusion, Intrusion Detection, Snort
PDF Full Text Request
Related items