Research on Openflow Application in Intrusion Detection Evaluation

Article Preview

Abstract:

Based on the data source problems of intrusion detection evaluation and the feature of OpenFlow capable of providing flexible network control, this paper studies the real data evaluation model based on the software-defined network, and makes program implementation over the model-based intrusion detection evaluation system, and then uses the network to simulate this model. The experimental result shows that the model is feasible and effective.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1908-1911

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] . RICHARD LIPPMANN, ROBERT K CUNN INGHAM. Results o f the DARPA 1998 Off-Line Intrusion Detection Evaluation [R]: MIT Lincoln Laboratory, (1999).

Google Scholar

[2] RICHARD LIPPMANN et al. Proposed 1999 DARPA off-line Intrusion Detection Evaluation Plans[R]: MIT Lincoln Laboratory, (1999).

Google Scholar

[3] Unfeng . Tian, Tao Liu, XiaoXiang Chen. Survey in Evaluation of Intrusion Detection System [J]. Computer Engineering and Applications, 2008, 44 (9): 113-117.

Google Scholar

[4] Chuan Lin, Zixiao Jia, Kun Meng. Research on Adaptive Future Architecture[J]. Chinese Journal of Computers, 2012, 35(6) ), 1077-1093.

Google Scholar

[5] Lijun Wang, Yongqiang Liu, Jian Zhang. Research on Future Internet Experimental Technology Based on OpenFlow[J]. Telecommunications Network Technology, 2011, 1(6), 1-4.

Google Scholar