Font Size: a A A

Study On Intrusion Detection Based On Dynamic Sorting

Posted on:2007-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:G H LiuFull Text:PDF
GTID:2178360212968388Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the use of information transmission,network for the sharing of information resources and an ever-expanding range of applications. The unit makes networks become larger and larger scale and more complicated. Meanwhile, the network carries risks, For example, network viruses and Internet attacks by hackers, Trojan horse procedure. Deadlock It is necessary to establish including firewalls, authentication integrity functions network security scanning and dynamic network security intrusion detection systems and other security measures integrated defense system, Network security can be ensured. instability caused by the operation of the system even such phenomena, resulting in incalculable loss of users and the company. Modern network security is no longer just firewalls and other security equipment will be installed on can sit back and jamming.Given the limitations of hardware firewall. If we can setup a software intrusion detection system within the hardware firewall, These units will be based on the actual situation and Intrusion Detection System Optimization of the detection method, Hardware firewall and complement each other by avoiding short, perfect the internal network security.This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; Rules can be dynamically adjusted to the invasion plan. The study included the following:(1) Analysis shows the types and characteristics of the current intrusion detection system (IDS), the misuse detection and anomaly detection system characteristics of the system, use and misuse detection systems identified in this paper as the object of study;(2) Introducing the system architecture and treatment process on the Snort Intrusion Detection System used in the experiments;(3) Researching the hacker intrusion methods and look them as the experiment to test;(4) The Snort intrusion detection system in the planning, design and experimental methods. And on the use of "Bubbling algorithm" to optimize the scheduling Detection System;(5) Analysis of test data before ordering. Test data shows that the method to improve the detection efficiency of the Snort Intrusion Detection System.
Keywords/Search Tags:IDS, Dynamic sorting, Intrusion detection, Network security, Attack
PDF Full Text Request
Related items