Distributed Intrusion Detection and Research of Fragment Attack Based-on IPv6

Article Preview

Abstract:

IPv6, the address has to aggregation, thus greatly reducing the length of the routing equipment routing table to improve the efficiency of routing and security, but then there is any possibility of network intrusion attack. This paper used to implement IPv6 Snort intrusion detection software, intrusion detection system is proposed as long as the server itself TCP / IP stack on the handling of data packets are different, the packet will bypass the intrusion detection system from the ground to produce a TCP fragment attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1797-1801

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] China Protocol Analysis Net [EB/OL]. http: /www. cnpaf. net.

Google Scholar

[2] Song Xian-tao, Lu Jun-kang and Li Xiang-he: Taxonomy Research of Intrusion Detection System [J]. Computer Engineering and Application, 2002(8).

Google Scholar

[3] Bace G. R: Intrusion Detection [M]. Beijing: People's Post and Telecommunication Publishing House, (2001).

Google Scholar

[4] Guan Li-hua and Wang An-wen: The Research of Intrusion Detection System [J]. Telecommunication Exchange, 2006(1): 24~28.

Google Scholar

[5] Zhang Yue-gong and Li Da-xing: Network attacks and intrusion technology under IPv6 [J]. computer science, 2006, 33(2): 100~102.

Google Scholar

[6] Yi Zhao-ming, Su Zhi-sheng, and Zhao Xiao-yu, Ma Yan: The Realization of IPv6 Fragment-reassembly in Snort Intrusion Detection System [J]. Morden Telecommunication Technology, 2005(4): 45~49.

Google Scholar

[7] Chen Yi-quan: Security Analysis of Network Intrusion Detection System Snort [D]. Zhejiang: Zhejiang Technology and Business University, (2005).

Google Scholar