Zhimin Zhou, Chen Zhongwen, Zhou Tiecheng, G. Xiaohui
{"title":"Snort网络入侵检测系统的研究","authors":"Zhimin Zhou, Chen Zhongwen, Zhou Tiecheng, G. Xiaohui","doi":"10.1109/ICNDS.2010.5479341","DOIUrl":null,"url":null,"abstract":"Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous intrusion detection system in the field of open source software. It is widely used in the intrusion prevention and detection domain in the world. In this paper, we explain how Snort implements the intrusion detection, which includes building the compiling environment and analysizing the work-flow and rule tree. This paper will provide a valuable reference for the study of Snort.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"The study on network intrusion detection system of Snort\",\"authors\":\"Zhimin Zhou, Chen Zhongwen, Zhou Tiecheng, G. Xiaohui\",\"doi\":\"10.1109/ICNDS.2010.5479341\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous intrusion detection system in the field of open source software. It is widely used in the intrusion prevention and detection domain in the world. In this paper, we explain how Snort implements the intrusion detection, which includes building the compiling environment and analysizing the work-flow and rule tree. This paper will provide a valuable reference for the study of Snort.\",\"PeriodicalId\":403283,\"journal\":{\"name\":\"2010 International Conference on Networking and Digital Society\",\"volume\":\"124 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Networking and Digital Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNDS.2010.5479341\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The study on network intrusion detection system of Snort
Network security is a complex and systematic project. The intrusion detection system is the first line of defense against network security. Snort is a famous intrusion detection system in the field of open source software. It is widely used in the intrusion prevention and detection domain in the world. In this paper, we explain how Snort implements the intrusion detection, which includes building the compiling environment and analysizing the work-flow and rule tree. This paper will provide a valuable reference for the study of Snort.