Font Size: a A A

Golden Tax Network Intrusion Detection System Research And Implementation

Posted on:2007-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ChiFull Text:PDF
GTID:2208360212470344Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer and network, the application of network technology is increasingly popularizing; and the network opening and the network sharing are continuingly expanding, so the network security is becoming more and more impending and challenging. As one of the network security technologies, the intrusion detection technology is developed in recent ten years, and it is getting more and more attentions, it is becoming the focus of the domestic and foreign computer experts and the network companies. The intrusion detection system is an active security detection technology. It can detect the network packets, monitor various suspicious attack behaviors, find out the intrusions.The network IDS is composed of two parts: packet processing and content processing. The main function of packet processing is analyzing protocol, assembling packets.Packet processing, which is one of the key techniques of the system,is the precondition and foundation of content processing, has great influence on the performance of the whole system.The content processing is one of core modules of the network IDS. It is needed to process the network traffic at high rate, and it must guarantee the processing in real time and efficiently.In this thesis,the advantage and the shortage of the present network security solution, for example, Firewall, Antivirus, Loophole, etc, are analyzed. The basic concept,development,sort and characteristic of network IDS are introduced.The network intrusion dection system in the computer network of Taxation Bureau is researched and explored in detail. The main jobs and contributions of this thesis include:(1) The model of the network IDS is proposed and the work flow of the network IDS is analyzed.
Keywords/Search Tags:network security, intrusion detection, content processing, protocol analysis, pattern matching
PDF Full Text Request
Related items