Font Size: a A A

Application Development And Research On The Key Techniques Of Intrusion Detection

Posted on:2014-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y D LiuFull Text:PDF
GTID:2308330473458749Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network security is a hot issue in today’s society, the location of all existing networks exist network security issues, this department during intrusions and attacks, requiring the construction of the it, network intrusion detection systems has two types, one is a commercial product, such asNetRanger,such tools have good performance, but the price is high, and the other is an open source network security products, such as snort, such tools implementation and configuration of more complex, these products lack visual management interface for the user’s ability to operate the system requirements are too high, but with higher safety performance.This study is aimed at the organization’s network security issues research, study abroad intrusion detection system based on the relevant literature, a new idea carried out to achieve. The study completed the following work.(1) the department’s network was modified to achieve a unified planning and unified network management.(2) design and implement a network firewall export, through iptables linux system configuration tools, implements stateful packet filtering firewall rules implemented by fast packet filtering capabilities.(3) at the entrance of the department’s two arranged a snort network intrusion detection system, through the snort configuration and improvements completed snort mysql data output, complete knowledge base of learning snort update feature.(4) intrusion detection management system designed to achieve a visual configuration management capabilities, real-time network monitoring, system control functions and data management functions. Users can not solve the intuitive control of intrusion detection systems.(5) on the intrusion detection system has been thoroughly tested, test results show that the system can demand for network data filtering, network intrusion events capture and warning, to achieve a visual management functions.
Keywords/Search Tags:intrusion detection, firewall, management systems
PDF Full Text Request
Related items