Font Size: a A A

Intrusion Detection System Based On Peer-to-Peertopology With SuperNode

Posted on:2012-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:L DongFull Text:PDF
GTID:2218330338463132Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network, the problem of network security which we need to dealwith is explosive increase. The traditional network security technology such as digital signature,access control, firewall have not good enough to meet the current network security needs. Intrusiondetection system as a kind of positive safe protection technology, has become an important researchhotspot.At present, the intrusion detection system research focuses on the intrusion detection systemmodel and intrusion detection technology. In a massive high-speed network environment, facing thedistributed collaborative attack, the traditional intrusion detection system has been provedpowerless. Therefore, distributed peer-to-peer network structure intrusion detection system cameinto being. He effectively improves the intrusion detection system performance and expansionability. But the structure also has some deficiencies. The nodes need scheduling allocation ofresources cooperatively, it will increase the traffic, increase network burden. Node failed will makethe workload lost. In addition, the nodes alarm quality are united hard, easy to produce the omissionor material misstatement.In view of the above questions, this paper design an Intrusion Detection System based on Peerto Peer topology--- SuperNode(P2IDS-SN). It inherited the distributed intrusion detection systemmerit, and use SuperNode share some of the management job, in order to reduce unnecessarynetwork burden, avoid workload lost. This paper emphatically design its cooperation mechanismand alarm processing mechanism, strengthen the cooperative strategy ability, improve alarm quality.We simulate the P2IDS-SN - SN system with SNORT, and test it based on Windows.
Keywords/Search Tags:Intrusion detection system, network security, Peer to Peer topology, SuperNode
PDF Full Text Request
Related items