Font Size: a A A

Pattern Matching In Intrusion Detection System

Posted on:2007-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q F DengFull Text:PDF
GTID:2208360182493691Subject:Computers and applications
Abstract/Summary:PDF Full Text Request
With the rapid development of network access and to the increasing demand network, network users face increasingly serious security issues, the need for a credible, reliable, secure and stable network platform. Hacking into a computer has been the greatest threat to security and network security. The network came into being as the current study focused intrusion detection and hot spot.Research papers on the status of the intrusion were to sum up the main intrusion detection technology, methods, structure-depth analysis, presented the problems facing the intrusion testing technology trends and research and development, and testing technology intrusion of the main technical difficulties in the research and practice :First, present a summary of the theoretical framework IDS to create a unified IDS research base. demonstrated the need for the intrusion detection, and given the intrusion detection systems concepts and models, detailing a variety of testing methods and architecture intrusion. In addition, for reasons related to the invasion of testing technology development, development status and direction of development is described.Secondly, an analysis of a typical intrusion detection system (Snort). From the source code level and analyze the well-known free software (Snort) intrusion detection systems and design principles to achieve thrust, including the structure of the entire system design ideas, design features, systems and procedural framework core rules system analysis.Finally, in the analysis of the intrusion detection system (Snort), the pattern matching algorithm basis, an improvement BM algorithm. Misuse intrusion testing technology is the most important link in a pattern matching the current model of matching reported mainly on the text of character string matching. In the BM algorithm is the most widely applied mistakes made improvements BM algorithm. Improved algorithms compared with the standard BM algorithms, in comparison with a reduced frequency and time of performance improvement.
Keywords/Search Tags:Network management, Intrusion detection, Intrusion Detection System, Pattern matching, BM algorithm
PDF Full Text Request
Related items