Font Size: a A A

The Study Of Intrusion Detection System Based On Apical Dominance Control

Posted on:2008-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:R LiFull Text:PDF
GTID:2178360242456136Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of computer networks, network security has become more prominent. Safety technology is being applied in an increasing number of network security field. IDS is a new network security system technology, which is a pro-active defense technology, as well as a focus of computer and network security. But becuase of the immature of Intrusion Detection System (IDS), it restricts the application of the intrusion detection system.This paper analyzes the current information security and information security technology, and introduces the concept and development of the Intrusion Detection Technology first. Then the author makes some improvements for DIDS, on the base of studying the existing structure of IDS, as well as model of DIDS, combining the hierarchical structure of merit of DIDS, while the shortcomings of hierarchical control structure, according to the apical dominance tenets of its plants. At last proposes a new Distributed Intrusion Detection System Architecture of top edge and designs the structure, working principle and main parts of the function on detail. The system components operate independently and cooperate with each other, so that the system could adapt to the complex and volatile network environment, and take full advantages of network resources to complete intrusion detection coordination tasks. Plants used in the control of apical dominance principle Distributed Intrusion Detection System established by auxin information to the main module, once the control module is damaged, the system will rapidly re-establish a new one, and restore the original position after the primitive control module resume. So that to guarantee the system to work normally, improve the performance of the intrusion detection system and a better security.Meanwhile, the paper also proposes the concept of auxin information and communication platform, and introduces the study of the communications subsystem, news format definition and communication security mechanism design. Those provide safe and reliable means of communication for components of the system. And provide an effective implementation ensurance for Auxin contrast to send real-time information.
Keywords/Search Tags:Distributed Intrusion Detection System, DIDS, control, Apical dominance, Auxin information, Communications platform
PDF Full Text Request
Related items