Font Size: a A A

Research On Intrusion Detection System In Military Network Based On Pattern Matching And Protocol Analysis

Posted on:2012-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:P G HeFull Text:PDF
GTID:2178330338493384Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,With the rapid development of computer and network technology in the PLA, military network has become an important way the anti-China forces steal military secrets. The military has set up some related network protection centers, and depth studied the problems of network security, including a range of security technologies, such as data encryption, authentication authorization, access control policy and firewall technology, and achieved fruitful results.However, these security technologies are static, cannot effectively resist rapidly changing invasion attacks in today's complex network environment. The traditional intrusion detection systems based pattern matching rise to many problems, such as low efficiency, high false alarm rate, the limited capacity of detecting new attacks, and so can no longer meet the current urgent need for the army network security. The protocol analysis technology takes advantage of the high regularity of the network protocol to quickly detect the attacks, can improve the detection speed and accuracy, and the performance of intrusion detection systems. It can provide users with more complete intrusion detection and prevention, is now research hotspot in army network security.First of all, this paper systematically introduced the basic theories of intrusion detection.,introduced the basic theory of pattern matching, discussed in detail several pattern matching algorithms that intrusion detection systems commonly used, and analyzed the advantages and disadvantages of the pattern matching used in intrusion detection system. Then, the author introduced the knowledge on TCP/IP, and elaborated the basic idea and process of the simple protocol analysis technology..Finally, according to the characteristics of pattern matching and protocol analysis and the reference model of intrusion detection system, the author designed a new intrusion detection system based on pattern matching and protocol analysis for military network.
Keywords/Search Tags:Network security, Intrusion Detection, Pattern Matching, Protocol analysis
PDF Full Text Request
Related items