Font Size: a A A

Intrusion Detection System Snort Rule Base

Posted on:2008-08-12Degree:MasterType:Thesis
Country:ChinaCandidate:L F XuFull Text:PDF
GTID:2208360212999996Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the fast development of the network technology and theuniversal application of the network environmental, the safe problem innetwork is increasingly outstanding. The traditional Encryption technques and the Fire wall technique can't meet the expectations fully. Andas a safe means, Intrusion Detection techniques has displayed its impor-taut role.The Snort is a typical Net Intrusion Detection System, and some ofdesign principle and characteristics of which is the base of most popularmercantile Intrusion Detection System. There are strong academically andcommercial value to the research of Snort.In this text, writer regards Snort as the research object, analyzingits source code and rules, expounding the basic structure of the Snortsystem, and studying the technique in application of Snort. First; thebasic knowledge of intrusion detection is introduced. Then the principalpart of Snort and the module of its working process is presented with theprocedural graph, and the typical snort rules is analyzed. Last, a concreteapply scheme is put forward and the reform from IPv4 to IPv6 of snort isdiscussed.
Keywords/Search Tags:Intrusion Detection, Snort, Source code of snort, Basic structure of snort, Analyze snort, Snort rules, Application of snort
PDF Full Text Request
Related items