Font Size: a A A

Research On Intrusion Control And Audit Expert System

Posted on:2008-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:H J JiaFull Text:PDF
GTID:2198330335953226Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the rapid development of network technologies, the network security problem becomes more and more important. Also the researches on network security theory and protection techniques need creation and improvement continually. At present there are many kinds of network security techniques,and among which firewall technique and intrusion detection technique and security technique are applied most wildly. However, the three kinds of technique has some disadvantages in single use. Therefore, making synthetically use of the three kinds of technique to build an intrusion protection system become an important problem in the network security field. Based on the background requirement, this paper researches the interaction of firewall and intrusion detection system (IDS) and security audit technique thoroughly. Firstly, this paper introduces the development background of the network security techniques and research status at home and abroad, and deeply analyses the essentiality of the interaction of firewall and IDS and security audit. Secondly, it mainly discussed the ways of interacting between firewall technique, intrusion detection technique and security audit technique, and also analyses the advantages and disadvantages of the ways and means thoroughly. Aimed at the futures development prospect of the network security techniques, build a network security and defense system named intrusion control and audit expert system on basis of the interaction mode of firewall and IDS and security audit. Thirdly, the system framework and concrete solution of intrusion control and audit expert system is put forward . It also designs the constitution module in the system in detail. Finally it put research mainly on the key techniques of the interaction system such as the interface problem, keeping communication secret.
Keywords/Search Tags:IDS, Firewall, Security audit, Expert system, Interaction
PDF Full Text Request
Related items