Font Size: a A A

Research Of Linkage System Of IDS And Database Of Vulnerabilities Based On LDM

Posted on:2008-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y MaoFull Text:PDF
GTID:2178360218453367Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer network and more and more people mastered the technology of computer, network security becomes the bottleneck of development of network, especially, development of e-business. But the security tools each does things in its own way, they cannot withstand the omnidirectional and polymorphic attacks. Many ideas were brought up for resolving the problem, linkage is one. The linkage of firewall and intrusion detection system is a well-rounded technology, it defends exterior attacks depends on the policy of intrusion detection system. But this linkage is a defence based on the subject of attacks, common considered that defences based on the attacks'object is better than the subject.An idea of linkage defence based on the attacks'object was raised on the background of status quo, it focused on enhancing the object's safety factor. The article analysis the development of national and international, then referred a new linkage system– linkage of intrusion detection system and database of vulnerabilities. This system can alarm automatically on the vulnerability of attack, recommend mend. The third part of the article is analysised the technology, open source intrusion detection system– snort and medium-sized DBMS– MSSQL were used in system, the key technology is rewrite LDM algorithm and pick up the eigenvalue of CVE criterion. LDM algorithm is a string matching algorithm which has best time complexity at any case. After that, the experiment result which did on difference platform was raised. At the end of article, things what was did was summarized, and referred the system can be improved in standardization, encrypt communication, and intrusion tolerance.The experiment was did under the network communication, and different module was setup in different operation system. The result proved the feasibility of linkage of database of vulnerabilities and intrusion detection system, and the linkage is propitious to security level of whole network.
Keywords/Search Tags:CVE, database of vulnerabilities, IDS, linkage, LDM algorithm
PDF Full Text Request
Related items