Font Size: a A A

A Network Intrusion Detection System Based State Transition Analysis

Posted on:2008-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y H WangFull Text:PDF
GTID:2178360215461996Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today, Internet has already been an indispensable part of people's daily life as the computer network has developed rapidly; at the same time, the security of network draws more and more attention of people. At present, there are many technologies of network safeguard, for example, firewall, access control, data encryption; But all of these technologies are staticly defensive tools, which can not totally assure the security of network and resist the attack of hacker. Under this background, Intrusion Detection System has been a new direction, which can initiatively and dynamically provide security safeguard and supply the limitation traditional network security technologies.There exist host-based IDS and network-based IDS. Host-based intrusion detection system is os-related. Network intrusion detection system (NIDS) monitors packet on the network wire and attempts to discover if a hacker is attempting to breaking into a system. A NIDS may run either on the target machine who watches its own traffic or on an independent machine promiscuously watching all network traffic. NIDS now is a powerful means to protect our network.At first, this paper introduces the traditional network security technology, presents the research about an intrusion detection approach, researches the detection approach of state transition analysis. Then, this paper analyzes the feasibility in the environment based on network. An network intrusion detection model based on state transition analysis is designed to detect some penetrations. This paper gives the details of each module, data structures for the primary design and some codes.Finally, the feasibility of detecting network intrusion using state transition analysis has been proved by some experiments.
Keywords/Search Tags:Network Security, Intrusion Detection, State Transition Analysis
PDF Full Text Request
Related items