Font Size: a A A

Research About Intrusion Detection System Of IPv6 Based On Protocol Analysis

Posted on:2016-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:X M ZhangFull Text:PDF
GTID:2308330470479893Subject:Software engineering
Abstract/Summary:PDF Full Text Request
IPv6 protocol has super-large address space and good scalability, and IPv4 address space is drying up. So it is general trend that IPv6 will instead of IPv4. Although some security protocols have been increased in IPv6, but number of security issues still be there, the network intrusion will become more and more serious with the network technology updating.Intrusion detection collects information by analysising the key points in the network or computer system to search illegal authorization act or the signs of the attacks, and take some measures to prevent or delay the attacks, so it can get the time to get the response and stop it. This paper introduces the research on intrusion detection and background, and it introduces the different intrusion detection. It points out the issues that exist in the intrusion system, and introduces the IPv6 based intrusion detection system. So an intrusion detection system under the IPv6 with protocol analysis algorithm and decision tree algorithm is put forward. In this paper, IPv6 protocol is detailed analysis, and to improve the SPRINT algorithm, it introduces the concept of pure interval. and the improved SPRINT algorithm is used to the design of intrusion detection system.Finally, IPv6 environment is built with snort software, the frame is designed with protocol analysis algorithm and decision tree algorithm in the IPv6 environment, and it includes the data packet capture module, decoding module, detection module. Not only to verify the effectiveness of this intrusion detection system, but also to do the experiment between the improved SPRINT and the original SPRINT on the intrusion detection system, the results show that the new intrusion detection system can enhance the speed of the detection, and the more data, the more obvious.
Keywords/Search Tags:IPv6, Intrusion detection, Protocol analysis, SPRINT, Decision tree
PDF Full Text Request
Related items