Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2003-16
Add to Favorite Get Latest Update

Faster Filter Algorithms in Intrusion Detection System

ZHU Jie, HUANG Yanbo, WENG Yanbin (College of Information science and Engineering, Central South University,Changsha 410083)  
Intrusion detection system is a rapidly developed network security technology. But as network has developed toward rapid speed and broadband, detect engine becomes a performance bottleneck. If network is overload, IDS will lose attack messages. So packet filter algorithms are very important to solve this problem. A good algorithm can filter much no useful message and improve IDS's performance.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 SHI Chang-qiong1 2 TANG Ming1 ZHANG Da-fang2 ZHOU Kai-qing1 1.College of Computer and Communication Engineering Changsha University of Science and Technology Changsha Hunan 410004 China 2.College of Computer and Communication Hunan University Changsha Hunan 410082 China;Hash table based on Trie-tree[J];Journal of Computer Applications;2010-08
2 QIN Xiao-ming1,2,NIU Quan-ying1,WU Miao2,3(1.Department of Commputer and Information Engineering,Jiaozuo 454000,China 2.College of Computer,Xidian University,Xi'an 710070,China;3.Xi'an University of Finance and Economics,Xi'an 710061,China);Optimization Research on Pattern Match Algorithms in Intrusion Detection System[J];Computer and Modernization;2009-04
3 HAN Zhong-xiang~1,SHI Hao-shan~1,DU Hua-hua~2(1. Electronic Information College, Northwestern Polytechnical University, Xi′an, Shaanxi 710072, China; 2. The Telecommunication Engineering Institute, Air Force Engineering University, Xi′an, Shaanxi 710077, China);The Implementation of a Distributed Intrusion Detection System[J];Journal of Air Force Engineering University(Natural Science Edition);2004-05
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Zheng Jing - hua Lu Yu - liang Teaching and Research Office of Network Engineering of Electronic Engineering Institute;Analysis of Snort Rule Optimizer Technology[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 KONG Huijun(South China Teacher's University, Education and Science College Psychologist Department, Guangzhou 510631);Two Traditions in Memory Study[J];Journal of Anyang Teachers College;2003-03
3 ZHAO Jun_hui,XU Kun (College of Electronics and Information Engineering, Northern Jiaotong University, Beijing 100044,China);Design and Implement of Web Page Monitor and Restore System[J];Journal of Northern Jiaotong University;2002-01
4 KANG Hong,SHEN Xi-ting(Dept.of Computer Science & Software,Hebei University of Technology,Tianjin 300130,China);Intrusion Detection System Based on Snort and Windows[J];Ordnance Industry Automation;2005-02
5 SHI Yun-mei, YANG Gen-xing, ZHANG Zhi-hua ( Department of Computer and Automation, Beijing Institute of Machinery, Beijing 100085, China );Methodological research on getting Snort alerts on network security management platform[J];Journal of Beijing Institute of Machinery;2005-02
6 CHEN Chuan,HE Yue,HE Chang-zheng(College of Commercial Management, SCU, Chengdu 610064, China);Economic pre-warning based on self-organization data mining[J];Journal of Chengdu University of Information Technology;2005-01
7 XIE Li-jun,LIU Nai-qi,HAO Yu-jie(College of Computers,UESTC,Chengdu 610054,China);Network processor architecture based on IXP2400[J];Journal of Chengdu University of Information Technology;2006-06
8 LI Xin man, ZHAO Hong, MA Shi jun (Software Center, Northeastern University, Shenyang 110004, China);Firewall-Based Intrusion Detection System[J];JOURNAL OF NORTHEASTERN UNIVERSITY;2001-05
9 LUO Da-guang,HAO Yu-jie,LIU Nai-qi (School of Computer Science and Engineering, UEST of China Chengdu 610054);A Very Fast String Search Algorithm[J];Journal of University of Electronic Science and Technology of China;2005-06
10 CHENG Yong-xin,XU Jia-yi,CHEN Ke (School of Applied Mathematics, UEST of China Chengdu 610054);A Novel IDS Model and the Arithmetic to Get the Detection[J];Journal of University of Electronic Science and Technology of China;2006-02
【Secondary References】
Chinese Journal Full-text Database 9 Hits
1 HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China);An intrusion detection system based on memory principle[J];Journal of Hebei University of Engineering(Natural Science Edition);2008-01
2 Ma Yong-qiang1,LiuJuan2(1.Computer Department of Jining Teachers College,Wulanchabu Inner Mongolia 012000 2.English Department of Jining Teachers College,Wulanchabu Inner Mongolia 012000);Use and Test of Snort IDS[J];Journal of Jining Teachers College;2010-04
3 HAN Zhong-xiang1,2,ZHANG Rui2,SHI Hao-shan1,DONG Shu-fu2(1.College of Electric Information,Northwestern Polytechnical University,Xi'an 710072,China;2.Telecommunication Engineering Institute,Air Force Engineering University,Xi'an 710077,China);Research on intrusion detection system method based on data fusion[J];Application Research of Computers;2008-06
4 HAN Zhong-xiang~(1,2),SHI Hao-shan~1,ZHUANG Xu-chun~2(1.Electronic Information College,Northwestern Polytechnic University,Xi′an,Shaanxi 710072,China;2.The Telecommunication Engineering Institute,Air Force Engineering University,Xi′an,Shaanxi 710077,China);Implementation of IDS Based on MIB II[J];Journal of Air Force Engineering University(Natural Science Edition);2006-04
5 LI Hui,TUO Ming-fu,ZHANG Hong-mei(The Science Institute,Air Force Engineering University,Xi′an 710051,China);Design and Implementation of Security Attribute Service in CORBA[J];Journal of Air Force Engineering University(Natural Science Edition);2007-02
6 HAN Zhong-xiang1,2,SHI Hao-shan1,DONG Shu-fu2,YU Zheng2(1.Electric Information College,Northwestern Polytechnical University,Xi′an 710072,China;2.The Telecommunication Engineering Institute,Air Force Engineering University,Xi′an 710077,China);A Fast Method for Detecting Intrusion[J];Journal of Air Force Engineering University(Natural Science Edition);2008-01
7 HE Yong-fei,JIANG Jian-guo(School of Computer Department,Xidian Univ.,Xi'an 710071,P.R.China);Analysis and Block of TCP/IP Protocol Based on the By-pass Network Monitor[J];Science Technology and Engineering;2007-20
8 LIU Tao,HU Jia-wei (Dept.of Computer Sci.& Techn.,Anhui Univ.of Sci.& Techn.,Wuhu 241000,China);Research and Design of Data Encryption Based on Campus Network Environment[J];Computer Technology and Development;2008-01
9 (Tianjin Urban Construction Management & Vocation Technology College, Tianjin 300134, China) WANG Zhe;Research and Improvement on Rule Base of Snort[J];Microcomputer Information;2011-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved