Dissertation > Excellent graduate degree dissertation topics show

Intrusion Detection with SNORT rules library research

Author: XuLinFeng
Tutor: LuoGuangChunï¼›WangXiaoMing
School: University of Electronic Science and Technology
Course: Software Engineering
Keywords: Intrusion Detection snort snort source code the snort the basic framework Parse snort snort rule snort application
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 412
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of network technology and the environment, the growing popularity of network applications , network security issues have become increasingly prominent . Traditional encryption and firewall technology has not fully meet the security needs of the intrusion detection technology as a new security measure , more and shows its importance. Snort system is a typical network intrusion detection system , and some of its design principles and characteristics , research and development the cornerstone of most commercial intrusion detection system . The Snort system with a strong academic significance and high commercial value . Snort system , analyzing its source code and the rules of the system 's basic architecture , and discusses the specific application of the Snort system . First, the article describes the basic knowledge of intrusion detection technology , followed by the program flow chart described as the main form of the the Snort system body and the module workflow , followed by an analysis of some of the typical rules of Snort , and then put forward a specific application program .

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  3. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  4. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  5. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  6. An Intrusion Detection System for High-Speed Networks,TP393.08
  7. Research on the Security in Wireless Sensor Network,TN915.08
  8. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  9. Study of snort -based IPS,TP393.08
  10. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  11. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  12. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  13. Web-based intrusion detection system logs Design and Implementation,TP393.08
  14. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  15. Intrusion detection based on data mining technology research,TP393.08
  16. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08
  17. Research on Parallel and Distributed Intrusion Detection Technologies,TP393.08
  18. Attribute Reduction Based on Rough Set and Weighted SVM intrusion detection method,TP393.08
  19. Research of Intruding Detection Based on DCA and NSA Algorithm,TP393.08
  20. Research on Intrusion Detection Based on Protocol Analysis and Immune Principle,TP393.08
  21. Design and implementation of intrusion detection system based on association rules,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile