Font Size: a A A

Research Of Intrusion Behavior Detection System Based On IPv6

Posted on:2015-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:D K ZhangFull Text:PDF
GTID:2298330434957603Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
While IPv6is becoming more and more important in the world, most countries hasexpedited the research steps of security technology based on IPv6network. However, with thedevelopment of network technology, the security problems of IPv6have not been completelyresolved. IPv6was built to avoid the security problems of IPv4. For now, IPv6does have madegreat progress in the aspect of network security; it has solved the problems of data encryption,identity authentication, data security in an insecure network transmission, and so on. However,the changes in IPv6protocol is only located in the network layer, it has not completely solve theproblems of security, the complex, new, diverse network intrusion and attack happenedcontinually. Therefore, under the new environment of using IPv6, the studies of networksecurity technology need to be promoted vigorously.In the research of intrusion behavior detection system based on IPv6, research summarizesthe key knowledge and technology through the learning of intrusion detection system, includingpackets-capture tool, the analysis technology of the protocol, the pattern matching techniques,the establishment and update of rule database, real-time alarm and IP tracing technology.This article compares the IPv4and IPv6protocol through the datagram format, type ofaddress, the address allocation and ICMP protocol, mainly analyzes the performance ofintrusion behavior in them. On this basis, designed the various modules based on IPv6intrusionbehavior detection, proposed the rapid capture methods on IPv6data packets, and extended theprotocol stack of the protocol analysis technology.The article completed the requirement analysis, system design, the establishment andupdate of rule database of intrusion behavior detection system based on IPv6. In theenvironment of IPv6, we configured the development environment of the Snort, validated thepackets-capture module, protocol analysis module and rule database module through theexperiments.
Keywords/Search Tags:IPv6protocol, Intrusion behavior, Snort tools, Intrusion detection system
PDF Full Text Request
Related items