Font Size: a A A

Intrusion Monitoring System (ids) Application

Posted on:2003-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:H ZouFull Text:PDF
GTID:2208360062990169Subject:Industrial Economics
Abstract/Summary:PDF Full Text Request
when more and more campanies turn it focus business to Internet, Network Security shows itself as a no_runaround problem in front of people. Traditionally, companies usually adopt Fireworks as its first line of defence. Along with the increasingly maturity of Cracker, the increasingly multiplicity of means, pure Firework strategy have not any more satisfied some sections in demand of security of high degree. The defence of network needs deeply and various measures. As the same time, the net environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling_leak. All those aggravate the work of network administrators. A litter of negligence could bring up great hidden trouble. In such circumstance, IDS(Intrusion Detection System) becomes the new hotspot of security of markets. It wins more and more attentions, and begin to excert its key functions in various enviroments.In this thesis Intrusion is a conception of broad sense. It includes that Crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information,Denial of Service.Intrusion Detection, just as its name implies, is just to discover intrusions. By means of collecting and analyzing of information about some hinges of computer systems, it discovers whether there are behaviors disobeying the security strategy and cracked marks in networks systems. The combination of software and hardware proceeding Intrusion Detection is IDS. Different from other security products, IDS needs more intelligence. It must be able to analysis data and get useful insults. A eligible IDS can greatly simplify administrator's work, and insure network's safely running.From usual Firewall, this thesis draw IDS' basis concept, backgroup, instructure. To apprehend the model further, it will show you CIDF (The Common Intrusion Detection Framework), IDS' model.an example of building an IDS. At last it show a discussion fail-to-report and misinformation about IDS, ID's evaluation, challenges, outlooks, and further development.
Keywords/Search Tags:Firewall, ID(Intrusion Detection), IDS(Intrusion Detection System), leak, (Denial of Service), SNORT
PDF Full Text Request
Related items