The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 95 === With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/74292366750370509768 |
id |
ndltd-TW-095NCKU5652055 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NCKU56520552015-10-13T14:16:11Z http://ndltd.ncl.edu.tw/handle/74292366750370509768 The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology 以網路環境為基礎的入侵偵測及安全政策監控系統之研究與實作 Chin-Wei Chang 張勁為 碩士 國立成功大學 電腦與通信工程研究所 95 With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion behavior become more noticeable. Therefore, the network security devices become the essential devices when deploying the network. One of these security devices, Intrusion Detection System, is used for detecting all kinds of attacks, intrusion behaviors, and anomaly behaviors; and among various IDS, signature-based IDS is the most common IDS, besides, it also has high detection rate. However, with the increase of attack types and intrusion methods, the signature-based IDS must increase its detection rules to avoid false negative. While the detection rules increase, the system must consume more memory and hard disk space to storage the detection rules, besides, the detection time increases and the CPU may also overloads. For the reason above, we proposed and implemented a system to reduce the rules by network topology data, and by this system, we designed a distributed intrusion detection system architecture which the amount of each IDS should be less and the average detection rules for each node should be less, too. Finally, we evaluated and verified our system by several experiment, and the results showed our system can reduce a lot of unrelated rules without much false negative increasing. Chi-Sung Laih 賴溪松 2007 學位論文 ; thesis 103 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 95 === With the rapid development and popularization of Internet, people get mort rely on Internet; today, no matter the industry, commerce, government, military or even individual is inseparable form network, which makes the damage and threat of attack or intrusion behavior become more noticeable. Therefore, the network security devices become the essential devices when deploying the network. One of these security devices, Intrusion Detection System, is used for detecting all kinds of attacks, intrusion behaviors, and anomaly behaviors; and among various IDS, signature-based IDS is the most common IDS, besides, it also has high detection rate. However, with the increase of attack types and intrusion methods, the signature-based IDS must increase its detection rules to avoid false negative. While the detection rules increase, the system must consume more memory and hard disk space to storage the detection rules, besides, the detection time increases and the CPU may also overloads.
For the reason above, we proposed and implemented a system to reduce the rules by network topology data, and by this system, we designed a distributed intrusion detection system architecture which the amount of each IDS should be less and the average detection rules for each node should be less, too. Finally, we evaluated and verified our system by several experiment, and the results showed our system can reduce a lot of unrelated rules without much false negative increasing.
|
author2 |
Chi-Sung Laih |
author_facet |
Chi-Sung Laih Chin-Wei Chang 張勁為 |
author |
Chin-Wei Chang 張勁為 |
spellingShingle |
Chin-Wei Chang 張勁為 The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
author_sort |
Chin-Wei Chang |
title |
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
title_short |
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
title_full |
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
title_fullStr |
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
title_full_unstemmed |
The Study and Implementation of Intrusion Detection and Security Policy Management System Based on Network Topology |
title_sort |
study and implementation of intrusion detection and security policy management system based on network topology |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/74292366750370509768 |
work_keys_str_mv |
AT chinweichang thestudyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology AT zhāngjìnwèi thestudyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology AT chinweichang yǐwǎnglùhuánjìngwèijīchǔderùqīnzhēncèjíānquánzhèngcèjiānkòngxìtǒngzhīyánjiūyǔshízuò AT zhāngjìnwèi yǐwǎnglùhuánjìngwèijīchǔderùqīnzhēncèjíānquánzhèngcèjiānkòngxìtǒngzhīyánjiūyǔshízuò AT chinweichang studyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology AT zhāngjìnwèi studyandimplementationofintrusiondetectionandsecuritypolicymanagementsystembasedonnetworktopology |
_version_ |
1717751357531750400 |