| Along with the increasing of the network security risk coefficient. As the most important security measure, the firewall, has been can not Satisfy the people's need to network security, As the useful supply to the firewall, IDS can help the network system find the attack quickly, It enlarged the security manage ability of system administrator, (include Security audit, watch, attack identify and response), It improved the integrality of information security cadre. Along with the development of the network security technology, the apply of the IDS in the network environment is more and more common. For the work of the enterprise, government and other organic has been depend on the computer network system more and more, The urgent affairs is to protect the system from attack. Follow the increasing of the computer link in the network, IDS has been the important measure appearances. To overcome the default of the IDS model, we must to find an appropriate way to solve the problem, the paper discussed the solve project and the realize technology of these problem. The mostly content and production of the paper include:First, It introduced the basically conception of network security, intrusiondetection technology and neural network.Second, it put up a simple and effective arithmetic based on network. It detect the abnormally value of the domain information of the data link layer, network layer and the transport layer of the network data package to detect the attack. And it put up a simple intrusion detection model based on neural network. The model detect the abnormally value of the domain information of the network data package to realized the abnormally detection. The analysis engine of the model is based on neural network. It improved the tradition BP arithmetic. It is a new ID method for the TCP/IP network. It captured the network data package, distribute the task in reason, and based on the notify intrusion character figure, and it identify the intrusion action by NN. At last, we test and analyze the model. The NN system in the model need lucubrate, and the result display, the model is effective, it can detect the intrusion action in lowly mistake rate.Third, it made a detailed study on data capture technology. |