The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 95 === With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion...

Full description

Bibliographic Details
Main Authors: Chin-Wei Chang, 張勁為
Other Authors: Chi-Sung Laih
Format: Others
Language:en_US
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/74292366750370509768
id ndltd-TW-095NCKU5652055
record_format oai_dc
spelling ndltd-TW-095NCKU56520552015-10-13T14:16:11Z http://ndltd.ncl.edu.tw/handle/74292366750370509768 The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology 以網路環境為基礎的入侵偵測及安全政策監控系統之研究與實作 Chin-Wei Chang 張勁為 碩士 國立成功大學 電腦與通信工程研究所 95 With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion behavior become more noticeable. Therefore, the network security devices become the essential devices when deploying the network. One of these security devices, Intrusion Detection System, is used for detecting all kinds of attacks, intrusion behaviors, and anomaly behaviors; and among various IDS, signature-based IDS is the most common IDS, besides, it also has high detection rate. However, with the increase of attack types and intrusion methods, the signature-based IDS must increase its detection rules to avoid false negative. While the detection rules increase, the system must consume more memory and hard disk space to storage the detection rules, besides, the detection time increases and the CPU may also overloads. For the reason above, we proposed and implemented a system to reduce the rules by network topology data, and by this system, we designed a distributed intrusion detection system architecture which the amount of each IDS should be less and the average detection rules for each node should be less, too. Finally, we evaluated and verified our system by several experiment, and the results showed our system can reduce a lot of unrelated rules without much false negative increasing. Chi-Sung Laih 賴溪松 2007 學位論文 ; thesis 103 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 95 === With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion behavior become more noticeable. Therefore, the network security devices become the essential devices when deploying the network. One of these security devices, Intrusion Detection System, is used for detecting all kinds of attacks, intrusion behaviors, and anomaly behaviors; and among various IDS, signature-based IDS is the most common IDS, besides, it also has high detection rate. However, with the increase of attack types and intrusion methods, the signature-based IDS must increase its detection rules to avoid false negative. While the detection rules increase, the system must consume more memory and hard disk space to storage the detection rules, besides, the detection time increases and the CPU may also overloads. For the reason above, we proposed and implemented a system to reduce the rules by network topology data, and by this system, we designed a distributed intrusion detection system architecture which the amount of each IDS should be less and the average detection rules for each node should be less, too. Finally, we evaluated and verified our system by several experiment, and the results showed our system can reduce a lot of unrelated rules without much false negative increasing.
author2 Chi-Sung Laih
author_facet Chi-Sung Laih
Chin-Wei Chang
張勁為
author Chin-Wei Chang
張勁為
spellingShingle Chin-Wei Chang
張勁為
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
author_sort Chin-Wei Chang
title The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
title_short The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
title_full The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
title_fullStr The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
title_full_unstemmed The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
title_sort study and implementation of intrusion detection and security policy management system based on network topology
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/74292366750370509768
work_keys_str_mv AT chinweichang thestudyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology
AT zhāngjìnwèi thestudyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology
AT chinweichang yǐwǎnglùhuánjìngwèijīchǔderùqīnzhēncèjíānquánzhèngcèjiānkòngxìtǒngzhīyánjiūyǔshízuò
AT zhāngjìnwèi yǐwǎnglùhuánjìngwèijīchǔderùqīnzhēncèjíānquánzhèngcèjiānkòngxìtǒngzhīyánjiūyǔshízuò
AT chinweichang studyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology
AT zhāngjìnwèi studyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology
_version_ 1717751357531750400