Font Size: a A A

A Distributed Intrusion Monitoring System

Posted on:2005-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:K HuangFull Text:PDF
GTID:2208360125451402Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With great developments and extensive applications of technology of computer networks, especially for worldwide spread of Internet, science and technology of computer and internet are continuously innovated and upgraded. Infrastructure and resource of computer networks have become increasingly important to nations, enterprises and individuals, ceaselessly change traditional way in which people live, work and study, and bring about new problems and challenges at the same time. With the increase of informatization level and enhancement of dependence on computer networks for human society, how to keep informatization society running normally,safely and steadily is the most important issue of which computer network safety is one to be always strengthened and improved. At present, application of interconnected network is extensively extended and its open characteristic is extensively strengthened, which causes more and more network systems exposed to threat of attacks and intrusions.After introducing the corresponding background knowledge and analyzing the protocol frame releated to IDS , this paper focuses on these following parts:1.Offered a system adopting firstly distributary and later analysed by IDS array, resolve some problems such as how to integrate and the distributary module and the IDS array, how to converge outputs etc.2.Offered and realize a algorithm of distributary based on load balancing.3.To guarantee a low packet loss and to increase the detection ability of IDS in high speed network, an improved data collection engine is designed.
Keywords/Search Tags:IDS, distributed
PDF Full Text Request
Related items