Font Size: a A A

The Research Of LAN Intrusion Detection System

Posted on:2015-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:C X LiFull Text:PDF
GTID:2308330452970274Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network applications, various departmentsare currently facing LAN security problem. The paper designed and implemented anenterprise LAN intrusion detection system, to enhance network security protection.Intrusion Detection System (IDS) is a network security system of an emergingtechnology. It is a proactive defense technology. Intrusion detection systems are animportant complement to the firewall, its basic function is to monitor the internal andexternal network traffic, and to identify important characteristics or abnormalbehavior attack detection alarm while monitoring network firewalls and other hostattacks.In this paper, an analysis and study of the sources of information classifiednetwork intrusion, invasion of information, the realization of non-authorized use ofsystem resources to make timely judgments, records and alarms. On this basis, thearticle studies the Snort intrusion detection system based on Snort module structure,module function parsing rules and rule matching, intrusion detection process has beenresolved. In order to improve the efficiency of intrusion detection, the paper increasesdetection accuracy in the case of BM algorithm to match the character offset, reducingthe number of comparisons and system matching the time it takes to improve thesingle-mode BM intrusion detection system Snort detection engine uses matchingalgorithm, so that intrusion detection system efficiency is greatly improved.Comprehensive experimental data show that the improved algorithm in stringmatching speed faster than the original BM algorithm on average5%-10%,effectively reducing the number of comparisons and time, increasing the distancemode string moves significantly improved intrusion detection the detection efficiencyof the system.
Keywords/Search Tags:LAN, Intrusion Detection System, Pattern Matching, BM Algorithm
PDF Full Text Request
Related items