Sử dụng một số thuật toán tìm chuỗi signature để phân tích và phát hiện xâm nhập trong hệ thống mạng.

Algorithm to find the best sequence in the study of searching patterns to apply network-attack identifications has been evolving constantly. In this article, we deployed the search algorithm by simulation the forms of network attacks on intrusion detection system combined with firewall, IDS/ IPS, as...

Deskribapen osoa

Gorde:
Xehetasun bibliografikoak
Egile Nagusiak: Đặng, Lê Nam, Phạm, Nguyễn Huy Phương
Formatua: Bài viết
Hizkuntza:Vietnamese
Argitaratua: Trường Đại học Đà Lạt 2012
Gaiak:
Sarrera elektronikoa:https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/33641
Etiketak: Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
Deskribapena
Gaia:Algorithm to find the best sequence in the study of searching patterns to apply network-attack identifications has been evolving constantly. In this article, we deployed the search algorithm by simulation the forms of network attacks on intrusion detection system combined with firewall, IDS/ IPS, as well as the usage of tools for network monitoring such as open-source tool munin to analyze the forms of attack. Accordingly, we measure the time of pattern identification in the Snort IDS/ IPS, and at the same time measure both the performance of Snort and the number of packets passing through Snort, the amount of alerts per second on Snort, the number of packet drops, bandwidth, throughtput, the size of average packets, etc. relying on intelligent algorithms built in Snort in order to offer a way to choose different algorithms for each different form of intrusion detection.