基于协议分析的下一代网络入侵检测系统的研究与实现

Guo-xiang Yao, Quanlong Guan, Liangjie Lin, Shu-qiang Huang, Guo-cheng Zhu, Hui-ping Zhang, Zhi Gao
{"title":"基于协议分析的下一代网络入侵检测系统的研究与实现","authors":"Guo-xiang Yao, Quanlong Guan, Liangjie Lin, Shu-qiang Huang, Guo-cheng Zhu, Hui-ping Zhang, Zhi Gao","doi":"10.1109/CCCM.2008.30","DOIUrl":null,"url":null,"abstract":"An intrusion detection system which can work in IPv6 network environment is designed and implemented based on protocol analysis and pattern match technology in this paper. The system not only can fast detect system vulnerabilities and network intrusion events, but also possesses high accuracy and good performance. Furthermore, the system is tested using IDSwakeup. The test shows that the system can detect 90% of the attacking packets and lost hardly any packet when enormous and different types of vicious data packets generated by data packet generator are sent. So the system is efficient and quick-reacting IDS working in IPv6 environment.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Research and Implementation of Next Generation Network Intrusion Detection System Based on Protocol Analysis\",\"authors\":\"Guo-xiang Yao, Quanlong Guan, Liangjie Lin, Shu-qiang Huang, Guo-cheng Zhu, Hui-ping Zhang, Zhi Gao\",\"doi\":\"10.1109/CCCM.2008.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An intrusion detection system which can work in IPv6 network environment is designed and implemented based on protocol analysis and pattern match technology in this paper. The system not only can fast detect system vulnerabilities and network intrusion events, but also possesses high accuracy and good performance. Furthermore, the system is tested using IDSwakeup. The test shows that the system can detect 90% of the attacking packets and lost hardly any packet when enormous and different types of vicious data packets generated by data packet generator are sent. So the system is efficient and quick-reacting IDS working in IPv6 environment.\",\"PeriodicalId\":326534,\"journal\":{\"name\":\"2008 ISECS International Colloquium on Computing, Communication, Control, and Management\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 ISECS International Colloquium on Computing, Communication, Control, and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCCM.2008.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCM.2008.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

本文基于协议分析和模式匹配技术,设计并实现了一个可以在IPv6网络环境下工作的入侵检测系统。该系统不仅能够快速检测系统漏洞和网络入侵事件,而且具有较高的准确率和良好的性能。此外,还使用IDSwakeup对系统进行了测试。测试表明,在数据包发生器产生的大量不同类型的恶意数据包发送时,系统能检测出90%的攻击报文,几乎没有丢包。因此,该系统是一种在IPv6环境下工作的高效、快速的入侵检测系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research and Implementation of Next Generation Network Intrusion Detection System Based on Protocol Analysis
An intrusion detection system which can work in IPv6 network environment is designed and implemented based on protocol analysis and pattern match technology in this paper. The system not only can fast detect system vulnerabilities and network intrusion events, but also possesses high accuracy and good performance. Furthermore, the system is tested using IDSwakeup. The test shows that the system can detect 90% of the attacking packets and lost hardly any packet when enormous and different types of vicious data packets generated by data packet generator are sent. So the system is efficient and quick-reacting IDS working in IPv6 environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and Analyze the Model of the Management System Based on Active Network Dynamic Test and Evaluating System for Flight Control System Analyzing the Impact of Organizational Constraints on Performance of E-Business: A Research Perspective D-Stable H8 Fault-Tolerant Control for Delta Operator Systems with Actuator Failure The Logistic Management for E-Commerce
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1