Font Size: a A A

Based Network Intrusion Detection Technology And Realization

Posted on:2008-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:D LiFull Text:PDF
GTID:2208360242958371Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Network technologies with the tremendous development, a large number of networks appear. An increasing number of enterprises and individuals enjoy the convenience and freedoms of the network. But the network is obvious to all hazards, the development of network technology, for the convenience of us, also makes network security an enormous threat. As a basic network security measures, Firewall has entered the millions. However, in the face of increasingly complex network environment, the firewall is also demonstrated its tremendous shortage, especially for corporate users. So, Intrusion Detection System IDS (Intrusion Detection System) as a new generation of the Internet security tools have been to the people's attention. It passed on the computer network or computer system of several key points to collect information and analysis, found whether any breach of security strategy and the signs of attack from the network or system. Intrusion Detection software and hardware combination is Intrusion Detection System. And the difference is that the intrusion detection system needs more intelligence with other security products, it receives the data for analysis and obtains the useful results. A qualified Intrusion Detection System can greatly simplify the administrator's work to ensure network security operations.Technology advances rapidly in Intrusion Detection technically immature has attracted a lot of criticism, how better to improve intrusion detection technologies, it has been a subject of this goal. In this paper, it made a brief introduction of Intrusion Detection System and the classification on the current stage. The main technical means of detection were described. Analysis of the current traditional intrusion detection systems are faced with the problems and shortcomings and the pattern matching and protocol analysis IDS as the core engine done a detailed description, advantages and disadvantages as well as the interpretation, the pattern matching and protocol analysis in the network intrusion detection technology are highly complementary ingredients. At this stage of the string matching algorithm for certain analyzed and compared. And behind the concrete work on the detailed application of each module structure, it focuses on the achievement of the right main modules in analysis and discussion.
Keywords/Search Tags:network security, intrusion detection, pattern matching, protocol analysis, snort
PDF Full Text Request
Related items