MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS

碩士 === 國立臺灣大學 === 資訊管理研究所 === 89 === The network security problem will be more importance because the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker'&...

Full description

Bibliographic Details
Main Authors: SHEN, WEN-CHU, 沈文吉
Other Authors: Yeali S. Sun
Format: Others
Language:zh-TW
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/38956676282567723307
id ndltd-TW-089NTU00396018
record_format oai_dc
spelling ndltd-TW-089NTU003960182016-07-04T04:17:05Z http://ndltd.ncl.edu.tw/handle/38956676282567723307 MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS 網路安全監控與攻擊行為之分析與實作 SHEN, WEN-CHU 沈文吉 碩士 國立臺灣大學 資訊管理研究所 89 The network security problem will be more importance because the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker''s click action will make the business lost much transaction. The impact of information security will more serious such as the war of information. This paper will discuss the distributed denial of service attack and its defense. But we think that the real solution is to enhance the protection of every host. After that, the attacker will unable to construct the network of DDoS. The Network-based Intrusion Detection System is a good solution before overall individual protection. A subnet only need one IDS to monitor all the hosts. But the IDS have a common problem-large log data. For this problem, we analyse the behavior of attack and use NIDS snort to implement. Leveling rule as four levels-Emergency, Alert, Warning and Notification. Using the level of event log to mark ip as Hostile state, Threatening state and Suspicious state. The state and ip address will be saved in an IP-State database. Last, we use different rule level and IP state to differentiate the importance of the log for network administrator. We hope that will alleviate the problem of large log data. Yeali S. Sun 孫雅麗 2001 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 資訊管理研究所 === 89 === The network security problem will be more importance because the popular of Internet and Electric Business. Distributed denial of service attack not only successful on ordinary company, but also the well-known company such as Yahoo. The attacker''s click action will make the business lost much transaction. The impact of information security will more serious such as the war of information. This paper will discuss the distributed denial of service attack and its defense. But we think that the real solution is to enhance the protection of every host. After that, the attacker will unable to construct the network of DDoS. The Network-based Intrusion Detection System is a good solution before overall individual protection. A subnet only need one IDS to monitor all the hosts. But the IDS have a common problem-large log data. For this problem, we analyse the behavior of attack and use NIDS snort to implement. Leveling rule as four levels-Emergency, Alert, Warning and Notification. Using the level of event log to mark ip as Hostile state, Threatening state and Suspicious state. The state and ip address will be saved in an IP-State database. Last, we use different rule level and IP state to differentiate the importance of the log for network administrator. We hope that will alleviate the problem of large log data.
author2 Yeali S. Sun
author_facet Yeali S. Sun
SHEN, WEN-CHU
沈文吉
author SHEN, WEN-CHU
沈文吉
spellingShingle SHEN, WEN-CHU
沈文吉
MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
author_sort SHEN, WEN-CHU
title MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
title_short MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
title_full MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
title_fullStr MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
title_full_unstemmed MONITORING AND BEHAVIOR ANALYSIS OF NETWORK SECURITY SYSTEMS
title_sort monitoring and behavior analysis of network security systems
publishDate 2001
url http://ndltd.ncl.edu.tw/handle/38956676282567723307
work_keys_str_mv AT shenwenchu monitoringandbehavioranalysisofnetworksecuritysystems
AT chénwénjí monitoringandbehavioranalysisofnetworksecuritysystems
AT shenwenchu wǎnglùānquánjiānkòngyǔgōngjīxíngwèizhīfēnxīyǔshízuò
AT chénwénjí wǎnglùānquánjiānkòngyǔgōngjīxíngwèizhīfēnxīyǔshízuò
_version_ 1718334101160722432