Design and Research on Intrusion Detection System in the Computer Network Security

Article Preview

Abstract:

This paper first discusses the information security and network security, security threat, hacker intrusion process, system and network security vulnerabilities, and then introduces the status of intrusion detection system. By the comparison of two kinds of intrusion detection systems, the article puts forward the detection system based on the combination of the soil and the intrusion of network intrusion detection technology. Combined with the actual project development, this article focuses on the key technology design idea and the realization of the intrusion detection system in network security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1418-1422

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fan Rongzhen, Research on the intrusion detection technology based on information fusion, Zhejiang University of Technology, (2003).

Google Scholar

[2] Yang Xiaoping, Liu Daxin, Intrusion detection method based on specifications, Harbin Engineering University, (2005).

Google Scholar

[3] Chen Zhijian, Design and realization of a distributed intrusion detection system, Inner Mongolia University of Technology, (2005).

Google Scholar

[4] Yi Jing, prediction model in the application of intrusion detection, Shandong Normal University, (2003).

Google Scholar

[5] Zhu Yingliang, Jia Xiaozhu, Research and implementation of network intrusion deception and control technology, Qingdao University, (2005).

Google Scholar