Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Beijing Normal University(Natural Science)》 2004-01
Add to Favorite Get Latest Update

DEVELOPMENT OF A SNORT-BASED SECURITY NETWORK MANAGEMENT AND REAL-TIME INTRUSION DETECTION SYSTEM

Wen Xiaodong Huang Ronghuai Shen Changning Wang Lang Yao Jiqing (Information Science College, Beijing Normal University, 100875, Beijing, China)  
This system based on the model of network-based intrusion detection system(NIDS) is posited at the important network parts, in which it constantly monitors various data packets and analyzes suspicious packets. If the characteristics in the packets coincide with the intrusion regulations built in the system, the NIDS will send out a warning. Furthermore, this system provides some functions of security network management, such as the statistics of data stream, the surveillance of present active connections, etc.. It is suitable to use this system at small-to-medium enterprises network or campus network.
【Fund】: 国家计算机网络与信息安全管理中心预研课题基金资助项目 ( 2 0 0 1 研 3 0 13 )
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 HUANG Ai-ming(Chongqing City Managemtnt College,Chongqing 400055,China);A Study on Current Situation and Development Strategies at Domestic Education Software Quality[J];Coal Technology;2010-06
【Citations】
Chinese Journal Full-text Database 7 Hits
1 TANG Hong-ying,FU Guo-yu (Department of Computer Science, Chongqing Institute of Technology, Chongqing 400050,China);Principle and Method of Invading Detection[J];Journal of Chongqing Institute of Technology Management;2002-02
2 Yang Xiangrong Song Qinbao Shen Junyi (Department of Computer Science and Technology,Xi'an Jiaotong University,Xi'an 710049);Research on the Intrusion Detection Technology and A System's Design[J];Computer Engineering and Applications;2001-16
3 Ling Jun Cao Yang Ying Jianhua Lu Yong Huang Tianxi (College of Electronic and Information&State Key Laboratory of Software Engineering,Wuhan University,Wuhan430072);Design and Implementation of a Real-time Intrusion Detection Expert System[J];Computer Engineering and Applications;2002-09
4 Ruan Yaoping; Yi Jiangbo; Zhao Zhangsheng(State Key Lab of Information Security, Graduate School of USTC, Beijing 100039);The Model and Methodology of Intrusion Detection in Computer System[J];COMPUTER ENGINEERING;1999-09
5 Zhao Haibo, Li Jianhua, Yang Yuhang Department of Electronic Engineering, Shanghai Jiaotong University, China;Network Intrusion Intelligent Real Time Detection System[J];JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY;1999-01
6 Wang Gang, Qu Junhua (Dept.of Computer science and Technology,NCEPU(Beijing),Beijing 102206);Study of Distributed Intrusion Detection System[J];Modern Electric Power;2002-03
7 GUO Yu\+1, SUN Yi\+2, WANG Fang\+3 (1. China Academy of Transportation Science, Ministry of Communication, Beijing 100029, China 2.Department of Public Information Security Supervision, Zhengzhou Public Security Bureau, Zhengzhou 450005,China; 3.Resear;Construction of an Expert System Based Instrusion Detection System[J];Systems Engineering and Electronics;2001-12
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Wang ZhiXin (China Youth College for Political Sciences Beijing 100089);The Comparison of Several Common Web Browsers[J];Office Automation;2007-20
2 Deng Ping Zhao Zhuying (Yunnan Einsun Software College Kunming 651701);The Manual Detection Method & Defect Analysis Based on the Server Intrusion[J];Office Informatization;2010-14
3 Bi Jing1,Cheng Xiaojing1,Zhang Kun2(1.School of Science,BUCEA,Beijing 100044;2.School of Information Engineering,Hebei University of Technology,Tianjin 300130);Intrusion Detection Technique Based on a Combination Model of Multi Neural Networks[J];Journal of Beijing University of Civil Engineering and Architecture;2010-01
4 QIU Zhou-qiang,TENG Shao-hua,LI Zhen-kun,CHEN Ping-hua, ZHANG Wei (Faculty of Computer,Guangdong University of Technology,Guangzhou 510090,China);The Application of the Data Mining Technology in Network Intrusion Detection[J];Journal of Jiangxi Normal University(Natural Sciences Edition);2006-01
5 LI Ke-ling(Computer Science and Technology Institute,Changchun University,Changchun 130022,China);Study on intrusion detection technology[J];Journal of Changchun University;2007-06
6 TANG Yang,XU Qian(1.College of Computer Science of Chongqing University,Chongqing 400044,China;2.Chongqing Electric Power College,Chongqing 400053,China);The Recognition and Defenses of Network Intrusion Detection via Exceptional Operations[J];Journal of Chongqing Electric Power College;2008-01
7 Chen Ling (College of Mechanical Electromechanical Eng. UEST of China Chengdu 610054);Design of the Distributed Instrusion Detection System[J];Journal of University of Electronic Science and Technology of China;2002-02
8 ZHANG Min and LUO Guang-chun (Information Center, University of Electronic Science and Technology of China Chengdu 610054);IDMEF-Based Architecture of Large-Scale Cooperative IDS System[J];Journal of University of Electronic Science and Technology of China;2009-02
9 LI Jian (School of Information Security, Shanghai Jiaotong University,Shanghai 200240,China);Analysis of Intrusion Detection System[J];Computer Knowledge and Technology(Academic Exchange);2007-19
10 ZHANG Jun,ZHONG Le- hai (College of Computer Science, China West Normal University,Nanchong 637002,China);Research of Network Intrusion Detection System Based on IPv6 Environment[J];Computer Knowledge and Technology;2008-18
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Wang Jingzhong Chen Junming (College of Information Engineering,North China Univ.of Tech.,100144,Beijing,China);Study of NSMP IDS Technology Based on Snort[J];Journal of North China University of Technology Beijing China;2008-03
2 KANG Hong,SHEN Xi-ting(Dept.of Computer Science & Software,Hebei University of Technology,Tianjin 300130,China);Intrusion Detection System Based on Snort and Windows[J];Ordnance Industry Automation;2005-02
3 CHAI Ping-xuan, GONG Xiang-yang, CHENG Shi-duan (National Laboratory of Switching Technology and Telecommunication Networks, Beijing University of Posts and Telecommunications, Beijing 100876, China);Research on Distributed Intrusion Detection[J];Journal of Beijing University of Posts and Telecommunications;2002-02
4 HU Jia ( Changsha Aeronautical Vocational and Technical Collage, Changsha, Hunan, 410124 );Analysis and optimization of character’s catching algorithm in snort[J];Journal of Hunan University of Arts and Science(Science and Technology);2008-03
5 YAN Shu-ting1, LIU Jia-xin2, WANG Xin-sheng1(1. College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066004, China; 2. ModernEducation Technology Center, Yanshan University, Qinhuangdao, Hebei 066004, China);Analysis and improvement of structure of snort rule chain[J];Journal of Yanshan University;2006-03
6 WU Guo-wei,BI Ling,WANG Shi-yi(Software School,Dalian University of Technology,Dalian 116024,China);Study of a fast Snort intrusion detection system[J];Journal of Dalian University of Technology;2005-S1
7 Miao Baoqiu et al;The Method for Constructing Snort Rules Tree with Adaptability[J];Computer Development & Applications;2008-11
8 YAN Jin, MIAO Fang (College of Information Engineering, Chengdu University of Technology, Chengdu 610059, China);Analyse the Working Principle of Intrusion Detection System with Snort[J];Computer Knowledge and Technology;2009-25
9 Lu Huibin Tan Long Wang Yu(1.College of Material Science and Engineering,Yanshan University,Qinhuangdao 066004;2.Beijing University of Aeronautice and Astronamtics,Beijing 100083);Application of the network intrusion detection based on support vector machine[J];Electronic Measurement Technology;2008-02
10 WANG Zhi-qiang,WANG Meng (Institute of Computer Science and Technology,University of Science and Technology of Taiyuan,Taiyuan Shanxi 030024,P.R.China);Research and Implementation on Increasing speed of Rule-matching in Snort[J];Computer Security;2008-08
China Proceedings of conference Full-text Database 1 Hits
1 Xiang Rui, MaoYu ming School of Communication and Information Engineering,UESTC,Chengdu, 610054;Researches on faster-construction of Linux firewall[A];[C];2006
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 YAN Jin, MIAO Fang (College of Information Engineering, Chengdu University of Technology, Chengdu 610059, China);Analyse the Working Principle of Intrusion Detection System with Snort[J];Computer Knowledge and Technology;2009-25
2 Chen Chen Education Technology Center, Second Military Medical University, Shanghai, China 200433;On Inspiration of Success of Apple’s Educational Software on Development of China’s Educational Software[J];China Educational Technology & Equipment;2012-24
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Liu Mei lan; Yao Jing song (North Computation Centre,Beijing 100091);APPlication Of Neural Network in Intrusion Detection System[J];COMPUTER ENGINEERING AND APPLICATIONS;1999-06
2 Zhao Haibo, Li Jianhua, Yang Yuhang Department of Electronic Engineering, Shanghai Jiaotong University, China;Network Intrusion Intelligent Real Time Detection System[J];JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY;1999-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved