Font Size: a A A

Research Of Intrusion Detection System Based On Embedded Linux And TCP/IP Protocol Analysis

Posted on:2007-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:J MuFull Text:PDF
GTID:2178360242961663Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the high-speed communications network technology and IC design, embedded system has become a focus of the IT industry. A lot of embedded systems used in industrial control, network communications, military technology and domestic consumer digital equipment. Most of the current electronic products in the computer-based form, such as smart phones, personal digital assistants, routers, intelligent household appliances, etc., which is a lot of equipment in the form of embedded systems exist, and the interconnection of networks to provide users with better quality service, we believe embedded technology and embedded network application is an important future technology development. A lot of embedded systems used in industrial control, network communications, military technology and domestic consumer digital equipment.Meanwhile, with the increasing development of network technology, network security issues are receiving more and more attention. Intrusion Detection System is the firewall, data encryption and other traditional security measures to protect the safety and security of the new generation of technology, a growing number of applications. However, because of the invasion and the continued expansion of the scale of the network are constantly emerging, based on the traditional pattern matching IDS Intrusion Detection Technology no longer userful. The agreement is based on protocol analysis and network attached rules, it is the third-generation intrusion detection pattern matching technology that can meet the needs of the new IDS.This paper is aimed at embedded Linux Intrusion Detection System Research and Design, the whole sub-system hardware and software, the hardware side is based on the company's Samsung S3C44B0 core boards, the software used in the embedded operating system is not uClinux-- an MMU (memory management unit) for the specialized field of micro-control of the embedded operating system. The development and implementation of the system, the first Embedded Bootloader the analysis, then we have at this stage is more popular bootloader-uboot particular wrench for a transplant and its amendments. and then to uClinux operating system for the revised, translation, and transplantation, it can be made at the the corresponding wrench which operated. Finally, with the agreement of the data packet capture analysis. The direct analysis of ping scanning Dos (Denial of Service Attack) Study on Smurf types of attack and luring port scan, TCP SYN scanning TCP SYN flood, And the resulting development of a new generation of intrusion detection technology based-protocol analysis of the IDS.
Keywords/Search Tags:Embedded, Bootloader, Embedded system, Transplant, Intrusion Detection System
PDF Full Text Request
Related items