Font Size: a A A

Analysis And Research Of Intrusion In The Inveiglement System

Posted on:2008-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:C F ChenFull Text:PDF
GTID:2178360215497661Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with rapid development of Information Technology, especially applications of Internet and Intranet, an convenience and prompt information spread platform, which was formed by sharing and exchanging information through open network, provided advantaged condition for computers' prevalence, . At the same time, those brought flinty challenge for information security, so all kinds of defense systems appeared, such as encrypting techniques,firewall etc. However,these techniques all defense intrusion from outside passively, an active defense system——intrusion and inveiglement system was brought forward by academe.The intrusion and inveiglement system integrates firewall,intrusion detection and honeypots techniques, which can filtrate,capture and analysis data packages .Moreover, it can manage and check processes. The thesis is part of the intrusion and inveiglement system problems its main task is to capture intrusion data which base on the host computers and analysis characters of these data. At last, it may form a rule database with data packages and process characters. To achieve the aim we should understand intrusion detection,honeypots techniques completely and deeply. Firstly, the thesis designs structure of distributed data analysis system and realizes analysis of data characters by adopting arithmetic of SPC(Statistic Process Control) used in the management subject. Based on distributing of intrusion characters, the thesis designs distributed database structure and establishes rule database and assigns each field to different nodes through subsection horizontally.This way can examine all kinds of real-time intrusion and reflect all sorts of data intrusion actions by rule and line. Finally, the thesis implements data analysis by experiments.
Keywords/Search Tags:Intrusion detection, Honeypots, Data analysis, Distributed model, SPC(Statistic Process Control)
PDF Full Text Request
Related items