Font Size: a A A

Research And Implementation Of Network-based Intrusion Detection System

Posted on:2006-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z G JingFull Text:PDF
GTID:2208360155969208Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with economy and technical development, network occupy the more and more important position in the life of people, at the same time, the safe problem which network cause make more and more people notice, every year because of safe problem in network, for example, hacker invades, the virus infection etc. these result in economic expense which increase annually, it has attained thousands of million dollar ,This will require we must pay attention to the network security.There is a lot of safe systems now, they are proceeding the network security distinguish from the different aspect, for example the firewall, authentication, encrypt., but all these safe technique in network are active technology, intrusion detection is a passive technology, which also caused more and more the attention of people in recent years, with the push of market need and technique development,there appeared some new forms, such as, the way of deployment from centralize to distribute AGENT, the detection technique develop from the analysis of protocol and the pattern match to the nerve network, data mining out, the way of response from the passive alarm to the active linkage , the hardware system develop from the control machine of industry to ASIC( Application- Specific Integrated Circuit, t), FPGA( Field- Programmable Gate Array) , RISC( Reduced Instruction Set Computer).Through the large quantity of domestic and international literature, I has a knowledge of the current status of network security and network technique, I study the work of intrusion detection in detail, according to the development level of intrusion detection and applied circumstance, set up an intrusion detection system, which accords with the Common Intrusion Detection Framework, and has a good result in actual simulate environment, then make some research work in the system,put forward the some improvement project, and the next study direction...
Keywords/Search Tags:network security, intrusion detection, CIDF, Boyer/Moore Algorithm, the improvement Algorithm
PDF Full Text Request
Related items