Font Size: a A A

The Study And Implementation Of Distributed Intrusion Detection System

Posted on:2007-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:S W WuFull Text:PDF
GTID:2178360185477552Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The development Internet offers great convenience for efficient communion of global resources and information. But it also challenges the security of information severely. Nowadays information security has been a crucial problem of information system. Traditional information security model based of subject can't adapt to the development of network technology, P~2DR model emerges, as the times require. Intrusion Detection technology is a important component of P~2DR model. Being a kind of voluntary information protecting measures, intrusion detection is complement of traditional security protect technology such as firewall, data encryption and etc. It identifies the malice activities of utilizing computer and network resources and offers important information to confront intrusion. Not only does it detect outer intrusion behavior, but also it can supervise unauthorized activities of inside users. It makes up the limitation of traditional security defending technology. By forming dynamic security circulation, it can increase the ensuring security ability furthest, and reduce the risk of security threaten.In this paper, we analyze the status of network security and the current network security technology firstly; and then we introduce classic security model based subjects access objects and dynamic security model based P DR after introducing information security model; and we specifie intrusion detection system's importance to maintain information system and computer network system, after that, we advance the work tobe completed in this paper --studying distributed intrusion detection system aiminglarge scale network. We studied the background of the conceptions and developing courses of intrusion and intrusion detection, and analyze basic work theory and system modules of the intrusion detection system.As to the aspect of the system model designing, this paper put forward a hierarchical cooperation hybrid distributed intrusion detection system model. This model divides the network under protects into several security areas, and it is composed of sensor agent, monitor agent, countermeasure agent. The divisions of...
Keywords/Search Tags:Network Security, Distributed Intrusion Detection, Pattern Match, Component Message Exchange
PDF Full Text Request
Related items