The Analysis and Research of Intrusion Detection System Based on IPv6 Protocol Analysis

Article Preview

Abstract:

In order to solve the security issue about network intrusion in IPv6 system, two modes of intrusion detection system based on IPv6 protocol analysis have been developed and designed. Based on these two modes, packet capture module, protocol analysis module, command parsing module and out-put processing module have been designed. The accuracy and efficiency of intrusion detection system based on IPv6 protocol analysis have been verified through the test focused on the key modules.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 760-762)

Pages:

617-622

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu H, Yu L. Toward integrating feature selection algorithms for classification and cluatering[J]. IEEE Tram. on Knowledge and Data Engineering, 2005, 17(3): 1-12.

Google Scholar

[2] Chu Lingyu, Wu Xuezhi, Qi Wenjuan. Discussion in the Security Mechanisms of IPv6 [J]. Microcomputer Information, 2006, 22(1): 10-13.

Google Scholar

[3] Zhang Yuegong, Li Daxing. Analysis of Network Attack and Intrusion under IPv6 [J]. Computer Science, 2006, 33(2): 100-102.

Google Scholar

[4] Zhang Daoqiang, Chen Songcan. Analysis on the Method of Dimension Reduction about High-Dimension Data [J]. China Computer Federation, 2009, 5(8): 15-21.

Google Scholar

[5] Liu Shijie. Analysis on the Network Threat and Security Technology under IPv6 . Master degree paper, Zhengzhou: The PLA Information Engineering University. (2007).

Google Scholar

[6] ALMGREN M, LINDQVIST U. Application-Integrated Data Collection for Security Monitoring [A]. Proceedings of the Fourth International Symposium on the Recent Aduances in Intrusion Detection (RAID2001)[C]. 2001: 22-36.

DOI: 10.1007/3-540-45474-8_2

Google Scholar

[7] Han Donghai, Wang Chao, Li Qun. Case Analysis of Intrusion Detection System [M]. Beijing: Tsinghua University Press, (2002).

Google Scholar

[8] Tang Zhenjun (eds). Design and Implementation of Network Intrusion Detection System [M]. Beijing: Publishing House of Electronics Industry, (2002).

Google Scholar

[9] RFC2893, Transition Mechanisms for IPv6 Hosts and Routers[S].

Google Scholar

[10] Gilligan R. Basic Transition Mechanisms for IPv6 Hosts and Routers [Z]. RFC4213, (2005).

DOI: 10.17487/rfc4213

Google Scholar

[11] Sun Yong, Zhang Heng, Ma Yan. IPv6-based Interaction System with Intrusion Detection and Firewall [J]. Computer Engineering 2008, 34(11): 152-154.

Google Scholar

[12] Colt C J, Staniford S. Toward Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort[A]. Proceedings of 2nd DARPA Information Survivability Conference and Exposition(DISCEX 2)[C]. Piscataway: IEEE CS Press. 2001: 367-373.

DOI: 10.1109/discex.2001.932231

Google Scholar