Font Size: a A A

Design And Implementation Of Enterprise Intrusion Detection System

Posted on:2022-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:L S LiFull Text:PDF
GTID:2518306563463044Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the increasing complexity of the network environment,network attacks are increasing every day,their frequency and complexity are also increasing,and the means of network attacks are emerging one after another.What's more serious is that they often bypass the organization's existing protection and control,use new technologies and new methods to break through the target boundary defense and directly enter the intranet,damage or steal data,cause serious economic losses to the enterprise,and endanger the country and individuals.interest.At present,the network security situation is in a situation where offense and defense are completely unequal,and attack methods are updated and iterated very quickly,which has caused the defense to be in a disadvantageous position.Therefore,in order to deter attackers and protect corporate data security,the defender needs to develop a technical means that can actively counter attacks.In addition,traditional intrusion detection systems have certain limitations in defensiveness and interactivity.In order to change the situation of unequal attack and defense,overcome the limitations of traditional intrusion detection systems,and provide enterprises with good solutions and more effective and humane services,the company decided to develop this system.The author researched the background and requirements of the intrusion detection system,and participated in the system function design,architecture design,database design,etc.on the basis of relevant business analysis and technical research,and realized the enterprise's active defense intrusion detection system.In this project,The author independently designed and implemented the following five modules:(1)Threat trapping management module: This module mainly implements the management functions of trapping tools such as honeypots.Through the trapping and deception of honeypots,the attacker is induced to enter the honeynet isolated from the real network,which delays the attacker's attack speed,protects real assets,and obtains the original data of the attacker.In this module,users can implement functions such as honeypot management and node management.(2)Threat hunting module: This module mainly realizes the monitoring and query functions of attackers and attack activities.In the threat hunting module,the user can monitor the attack events trapped by the honeypot,and can also query the attacker and attack activity by combining conditions.The page will display the queried threat event,level,attack chain and other information.In addition,users can also trace the source of the attack and view the attacker's portrait.(3)Threat Intelligence Management Module: This module mainly realizes the functions of users' inquiries and management of intelligence,which is convenient for users to manage intelligence in a unified manner.Its functions include querying intelligence details,multi-source intelligence access and fusion,intelligence life cycle management,traceability,etc.(4)Threat intelligence statistics module: This module mainly realizes the statistics of threat hunting and threat intelligence and other data,and displays the statistics to users in the form of charts.(5)System configuration module: This module mainly realizes the function of user-defined configuration according to their own needs.Users can complete user management,information subscription,whitelist management and other functions in this module.The active defense intrusion detection system constructed in this paper has changed the passive defense situation of traditional intrusion detection systems,greatly improved the ability and efficiency of capturing threats,and improved the management mode of intrusion detection.
Keywords/Search Tags:Cyber attack, Offense and defense, Threat hunting, Intelligence
PDF Full Text Request
Related items