Font Size: a A A

A Study Of The Application Of Network Intrusion Detection Technique In The Library Network System

Posted on:2008-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:L JiaFull Text:PDF
GTID:2178360215990767Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of network technique and its scope, the problem of network security becomes increasingly prominent. How to detect the various intrusions that are likely to damage the computers quickly and effectively is growing more and more important for assuring the security of the system and the network. Intrusion detection is a new network security technique, which makes use of the trace left by the intruders to detect illegal intrusions such as internal attack, external attack and wrong manipulation. By collecting and analyzing information from the key parts of network or the computer system, this technique can help to discover whether there is any trace of illegal operation or attack, which further assures the security of information systems.This lecture mainly deals with the followings:1,Starting from the security problem of the present network, this lecture analyses and discusses the importance of network security. After introducing the concept of intrusion detection technique and studying the worldwide literature about intrusion detection, the author defines intrusion detection, classifies it and points out the actuality and shortcomings in the intrusion detection system. Finally, the author gives a general introduction about its developing trend.2,Aiming at the means of network attack, the author analyses the common attack principals of many common attacks, such as service rejection attack,information collecting attack and fake message attack and so on. Then the author gives some effective defending solutions accordingly.3,The features of campus network security are discussed. In light of the fact that the campus network suffers more from service rejection attack and network junk data jam, the author classifies the system as data collecting module, statistic analysis module, resolving module and alarm module under the design framework of prototype system. The statistic algorithm of the core module, statistic analysis module, is further resolved.
Keywords/Search Tags:Intrusion detection system, network, Denial of Service
PDF Full Text Request
Related items