Font Size: a A A

Based On The Snort Intrusion Detection Application System Design And Implementation

Posted on:2009-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2208360245461861Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the last few years, the intelligence that breadth take to connect into the technique is increasingly universal, and the residence is with the new hot point that the small area of residence will become people to consume. Therefore, can't the safe problem of family that neglect also immediately put in our in front, and how to guarantee the family network the system not quilt attack with break, and have already become the important mission that manage of current family network.As information security technology for the further development of security solutions, such as firewall technology, anti-hacking technology, encryption technology, and the entire system factors of insecurity scanning, detection and alarm, control and so on have emerged and developed, with Intrusion Detection for a representative of the dynamic security technology, it can take the initiative to detect vulnerable point and the network security loopholes, and often can be detected before artificial risky behavior, intrusion detection can be found dangerous attack characteristics, thereby detect attacks issued alarm, while taking protective measures. Intrusion detection technology is the "firewall", "data encryption", and other traditional security protection measures, a new generation of security technology.In this paper, detailed analysis and research based on the misuse of the open source Snort Intrusion Detection System, its working principle, the rules of architecture and conducted in-depth analysis, and found Snort system in the high-speed network detection performance deficiencies and shortcomings, and by optimizing the use of technology and improvement of the rules of multi-pattern matching algorithm to improve performance of Snort. In this paper, Zhongshan City, also in accordance with the Education Information Network Center Room actual demand, expounded Intrusion Detection System design concepts, based on this based on the formation of a Snort Intrusion Detection System Application Design implementation of the integration program, the system described in detail the design of the engine , rules for design, analysis and console design flow specific issues, such as the need to increase the use of intrusion detection system security-related units have some reference and learn.
Keywords/Search Tags:Firewall, Network Security, Intrusion Detection, Intrusion Detection Systems, Pattern match, Snort
PDF Full Text Request
Related items