| With the continuous progress of computer network technology, it has brought great convenience for people to learn, work and life, however, with the continuous development of the Internet, the threat of which there is also growing, invasive technology is developing gradually developed the Internet means a network intrusion. In recent years, network security incidents arising due to network intrusion occurs constantly, for the safe operation of the Internet caused great obstacles, network security has been widespread concern in the community, in order to effectively enhance the safe operation of the network, with active protection intrusion detection system has been widely used, and the progressive development of the Internet has become a hot research subject areas.The research of Intrusion Detection System is a late development in the field of network security research and is a relatively new issue. Intrusion detection systems as the core module, speed detection engine has a direct impact on the detection efficiency of the whole system; and intrusion detection system, an important detection method, which is the pattern, its performance for the entire system to normal orderly operation has a greater impact. The design is based on patterns in the data analysis, the intrusion detection system is divided into misuse detection and anomaly intrusion detection, to match the pattern on the basis of the current error with intrusion detection, the efficiency of the system to detect the main performance pattern matching speed above the speed to improve the system detects a key is to have a good matching algorithm.This paper around the design and research of Campus Network Intrusion Detection System, the first overview of intrusion detection analysis were studied; then Snort of relevant content for a more in-depth study, which included a Snort of the structure, characteristics and workflow, etc. The design of the working environment under windows Snort configured, and the corresponding experiments and thus more clarity Snort analysis of relevant content; addition to the campus network intrusion detection system is studied design. |