Sử dụng một số thuật toán tìm chuỗi signature để phân tích và phát hiện xâm nhập trong hệ thống mạng.
Algorithm to find the best sequence in the study of searching patterns to apply network-attack identifications has been evolving constantly. In this article, we deployed the search algorithm by simulation the forms of network attacks on intrusion detection system combined with firewall, IDS/ IPS, as...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Bài viết |
Ngôn ngữ: | Vietnamese |
Được phát hành: |
Trường Đại học Đà Lạt
2012
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/33641 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
Tóm tắt: | Algorithm to find the best sequence in the study of searching patterns to apply network-attack identifications has been evolving constantly. In this article, we deployed the search algorithm by simulation the forms of network attacks on intrusion detection system combined with firewall, IDS/ IPS, as well as the usage of tools for network monitoring such as open-source tool munin to analyze the forms of attack. Accordingly, we measure the time of pattern identification in the Snort IDS/ IPS, and at the same time measure both the performance of Snort and the number of packets passing through Snort, the amount of alerts per second on Snort, the number of packet drops, bandwidth, throughtput, the size of average packets, etc. relying on intelligent algorithms built in Snort in order to offer a way to choose different algorithms for each different form of intrusion detection. |
---|