MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
碩士 === 國立臺灣大學 === 資訊管理研究所 === 89 === The network security problem will be more importance because the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker'&...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2001
|
Online Access: | http://ndltd.ncl.edu.tw/handle/38956676282567723307 |
id |
ndltd-TW-089NTU00396018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-089NTU003960182016-07-04T04:17:05Z http://ndltd.ncl.edu.tw/handle/38956676282567723307 MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS 網路安全監控與攻擊行為之分析與實作 SHEN, WEN-CHU 沈文吉 碩士 國立臺灣大學 資訊管理研究所 89 The network security problem will be more importance because the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker''s click action will make the business lost much transaction. The impact of information security will more serious such as the war of information. This paper will discuss the distributed denial of service attack and its defense. But we think that the real solution is to enhance the protection of every host. After that, the attacker will unable to construct the network of DDoS. The Network-based Intrusion Detection System is a good solution before overall individual protection. A subnet only need one IDS to monitor all the hosts. But the IDS have a common problem-large log data. For this problem, we analyse the behavior of attack and use NIDS snort to implement. Leveling rule as four levels-Emergency, Alert, Warning and Notification. Using the level of event log to mark ip as Hostile state, Threatening state and Suspicious state. The state and ip address will be saved in an IP-State database. Last, we use different rule level and IP state to differentiate the importance of the log for network administrator. We hope that will alleviate the problem of large log data. Yeali S. Sun 孫雅麗 2001 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊管理研究所 === 89 === The network security problem will be more importance because
the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker''s click action will make the business lost much transaction. The impact of information security will more serious such as the war of information.
This paper will discuss the distributed denial of service attack and its defense. But we think that the real solution is to enhance the protection of every host. After that, the attacker will unable to construct the network of DDoS. The Network-based Intrusion Detection System is a good solution before overall individual protection. A subnet only need one IDS to monitor all the hosts. But the IDS have a common problem-large log data. For this problem, we analyse the behavior of attack and use NIDS snort to implement. Leveling rule as four levels-Emergency, Alert, Warning and Notification. Using the level of event log to mark ip as Hostile state, Threatening state and Suspicious state. The state and ip address will be saved in an IP-State database. Last, we use different rule level and IP state to differentiate the importance of the log for network administrator. We hope that will alleviate the problem of large log data.
|
author2 |
Yeali S. Sun |
author_facet |
Yeali S. Sun SHEN, WEN-CHU 沈文吉 |
author |
SHEN, WEN-CHU 沈文吉 |
spellingShingle |
SHEN, WEN-CHU 沈文吉 MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
author_sort |
SHEN, WEN-CHU |
title |
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
title_short |
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
title_full |
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
title_fullStr |
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
title_full_unstemmed |
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS |
title_sort |
monitoring and behavior analysis of network security systems |
publishDate |
2001 |
url |
http://ndltd.ncl.edu.tw/handle/38956676282567723307 |
work_keys_str_mv |
AT shenwenchu monitoringandbehavioranalysisofnetworksecuritysystems AT chénwénjí monitoringandbehavioranalysisofnetworksecuritysystems AT shenwenchu wǎnglùānquánjiānkòngyǔgōngjīxíngwèizhīfēnxīyǔshízuò AT chénwénjí wǎnglùānquánjiānkòngyǔgōngjīxíngwèizhīfēnxīyǔshízuò |
_version_ |
1718334101160722432 |