Snort-tool-for-Intrusion-Detection.rar

  • PUDN用户
    了解作者
  • WORD
    开发工具
  • 212KB
    文件大小
  • rar
    文件格式
  • 1
    收藏次数
  • 1 积分
    下载积分
  • 13
    下载次数
  • 2013-03-22 21:34
    上传日期
通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理
Snort-tool-for-Intrusion-Detection.rar
  • Snort-tool for Intrusion Detection.doc
    266.5KB
内容介绍
<html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta charset="utf-8"> <meta name="generator" content="pdf2htmlEX"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css"> <link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css"> <link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/raw.css"> <script src="https://static.pudn.com/base/js/compatibility.min.js"></script> <script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script> <script> try{ pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({}); }catch(e){} </script> <title></title> </head> <body> <div id="sidebar" style="display: none"> <div id="outline"> </div> </div> <div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/bg1.jpg"><div class="c x0 y1 w2 h2"><div class="t m0 x1 h3 y2 ff1 fs0 fc0 sc0 ls0 ws0">&#27973;&#35848;&#20837;&#20405;&#26816;&#27979;&#24037;&#20855;<span class="_ _0"> </span><span class="ff2 sc1">Snort</span></div><div class="t m0 x2 h4 y3 ff1 fs1 fc0 sc1 ls0 ws0">&#29579;&#33021;&#20250;&#65288;<span class="ff3">20091308005</span>&#65289;</div><div class="t m0 x3 h4 y4 ff1 fs1 fc0 sc1 ls0 ws0">&#21016;<span class="ff3"> </span>&#20064;&#65288;<span class="ff3">20091308010</span>&#65289;</div><div class="t m0 x4 h4 y5 ff3 fs1 fc0 sc1 ls0 ws0">(2009<span class="_ _1"> </span><span class="ff1">&#32423;&#35745;&#31639;&#26426;&#31185;&#23398;&#19982;&#25216;&#26415;&#65288;</span>1<span class="ff1">&#65289;&#29677;</span>)</div><div class="t m0 x5 h4 y6 ff3 fs1 fc0 sc1 ls0 ws0">(<span class="ff1">&#35745;&#31639;&#26426;&#19982;&#36719;&#20214;&#23398;&#38498;</span> <span class="ff1">&#21335;&#20140;&#20449;&#24687;&#24037;&#31243;&#22823;&#23398;</span>)</div><div class="t m0 x6 h4 y7 ff1 fs1 fc0 sc0 ls0 ws0">&#25688;&#35201;<span class="ff2 sc1">:<span class="ff1">&#20837;&#20405;&#26816;&#27979;&#31995;&#32479;<span class="ff3">(Intrusion&#58899;Detection&#58899;System, IDS),&#58899;</span>&#26159;&#20449;&#24687;&#23433;&#20840;&#20307;&#31995;&#32467;&#26500;&#30340;&#37325;&#35201;&#32452;&#25104;&#37096;&#20998;&#12290;</span></span></div><div class="t m0 x6 h4 y8 ff1 fs1 fc0 sc1 ls0 ws0">&#31616;&#35201;&#20171;&#32461;&#20102;&#20837;&#20405;&#26816;&#27979;&#31995;&#32479;&#30340;&#27010;&#20917;&#12289;&#21151;&#33021;&#12289;&#20998;&#31867;&#21644;&#21407;&#29702;&#12290;<span class="ff3">Snort<span class="_ _1"> </span></span>&#26159;&#19968;&#20010;&#24320;&#28304;&#30340;&#20837;&#20405;&#26816;&#27979;&#31995;&#32479;&#12290;</div><div class="t m0 x6 h4 y9 ff1 fs1 fc0 sc1 ls0 ws0">&#20174;&#31995;&#32479;&#29305;&#28857;&#12289;&#32467;&#26500;&#12289;&#27969;&#31243;&#31561;&#26041;&#38754;&#23545;<span class="_ _1"> </span><span class="ff3">Snort<span class="_ _1"> </span></span>&#20570;&#20102;&#36739;&#20026;&#20840;&#38754;&#30340;&#25506;&#35752;&#12290;&#22522;&#20110;&#20197;&#19978;&#21407;&#29702;&#20171;&#32461;&#65292;&#36890;&#36807;</div><div class="t m0 x6 h4 ya ff1 fs1 fc0 sc1 ls0 ws0">&#22312;<span class="_ _1"> </span><span class="ff3">windows<span class="_ _1"> </span></span>&#29615;&#22659;&#19979;&#37197;&#32622;<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>&#36827;&#34892;&#31616;&#21333;&#30340;&#23454;&#39564;&#65292;&#28982;&#21518;&#32534;&#20889;&#31616;&#26131;&#30340;<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>&#35268;&#21017;&#26469;&#27979;&#35797;&#20854;&#22522;&#26412;&#24615;</div><div class="t m0 x6 h4 yb ff1 fs1 fc0 sc1 ls0 ws0">&#33021;&#65292;&#26469;&#30452;&#35266;&#24863;&#24615;&#22320;&#23637;&#29616;<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>&#30340;&#24037;&#20316;&#36807;&#31243;&#21644;&#21021;&#27493;&#24212;&#29992;&#12290;</div><div class="t m0 x6 h4 yc ff1 fs1 fc0 sc0 ls0 ws0">&#20851;&#38190;&#35789;&#65306;<span class="ff3 sc1">Snort<span class="ff1">&#65307;&#20837;&#20405;&#26816;&#27979;&#65307;&#20449;&#24687;&#23433;&#20840;</span></span></div><div class="t m0 x7 h5 yd ff3 fs2 fc0 sc1 ls0 ws0">A probe into Snort, tool for Intrusion Detection</div><div class="t m0 x8 h6 ye ff3 fs1 fc0 sc1 ls0 ws0">Nenghui Wang(20091308005)</div><div class="t m0 x9 h6 yf ff3 fs1 fc0 sc1 ls0 ws0">Xi Liu(20091308010)</div><div class="t m0 xa h6 y10 ff3 fs1 fc0 sc1 ls0 ws0">(Computer Science and Technology Grade 2009 Class 1 )</div><div class="t m0 xb h6 y11 ff3 fs1 fc0 sc1 ls0 ws0">(Computer and Software College, Nanjing University of Information and Technology)</div><div class="t m0 x6 h6 y12 ff2 fs1 fc0 sc1 ls0 ws0">Abstract:&#58892;<span class="ff3">Intrusion detection system (IDS) is the key component of the architecture of </span></div><div class="t m0 x6 h6 y13 ff3 fs1 fc0 sc1 ls0 ws0">information security. The summary, functions, classification and principle of intrusion detection </div><div class="t m0 x6 h6 y14 ff3 fs1 fc0 sc1 ls0 ws0">system are discussed. Snort is an instrusion detection system in the field of open source software. </div><div class="t m0 x6 h6 y15 ff3 fs1 fc0 sc1 ls0 ws0">A detailed dissection to snort in the aspect of characteristics, structure, procedure is provided. </div><div class="t m0 x6 h6 y16 ff3 fs1 fc0 sc1 ls0 ws0">Based on the principle provided above, configuration of snort under the windows OS </div><div class="t m0 x6 h6 y17 ff3 fs1 fc0 sc1 ls0 ws0">environment, a simple experiment and making up some rules for snort will help check out </div><div class="t m0 x6 h6 y18 ff3 fs1 fc0 sc1 ls0 ws0">fundamental functions of snort, meanwhile showing the working process and primary application </div><div class="t m0 x6 h6 y19 ff3 fs1 fc0 sc1 ls0 ws0">intuitively. </div><div class="t m0 x6 h6 y1a ff2 fs1 fc0 sc1 ls0 ws0">Key&#58892;words:<span class="ff3"> Snort ; Intrusion&#58899;detection; Information<span class="_ _2"></span>&#58899;security</span></div><div class="t m0 x6 h7 y1b ff2 fs3 fc0 sc1 ls0 ws0">1<span class="_ _3"> </span><span class="ff1 sc0">&#24341;&#35328;</span></div><div class="t m0 xc h4 y1c ff1 fs1 fc0 sc1 ls0 ws0">&#20114;&#32852;&#32593;&#32476;&#30340;&#34028;&#21187;&#21457;&#23637;&#32473;&#20154;&#20204;&#30340;&#24037;&#20316;&#29983;&#27963;&#24102;&#26469;&#26497;&#22823;&#30340;&#20415;&#21033;&#12290;&#28982;&#32780;&#65292;&#38543;&#30528;&#29616;&#20195;&#21270;&#32593;&#32476;&#24212;&#29992;</div><div class="t m0 x6 h4 y1d ff1 fs1 fc0 sc1 ls0 ws0">&#30340;&#26222;&#21450;&#65292;&#20276;&#38543;&#32780;&#26469;&#30340;&#32593;&#32476;&#19981;&#23433;&#20840;&#22240;&#32032;&#20063;&#32473;&#32593;&#32476;&#20449;&#24687;&#23433;&#20840;&#24102;&#26469;&#20102;&#20005;&#23803;&#25361;&#25112;&#65292;&#20256;&#32479;&#30340;&#32593;&#32476;&#23433;&#20840;</div><div class="t m0 x6 h4 y1e ff1 fs1 fc0 sc1 ls0 ws0">&#25216;&#26415;&#24050;&#32463;&#24456;&#38590;&#23545;&#20184;&#36825;&#20123;&#26085;&#30410;&#20005;&#37325;&#30340;&#23433;&#20840;&#23041;&#32961;&#65292;&#25152;&#20197;&#25105;&#20204;&#23601;&#26377;&#24517;&#35201;&#21435;&#24320;&#21457;&#19987;&#38376;&#30340;&#24037;&#20855;&#21435;&#36991;&#20813;</div><div class="t m0 x6 h4 y1f ff1 fs1 fc0 sc1 ls0 ws0">&#36825;&#20123;&#19981;&#23433;&#20840;&#22240;&#32032;&#30340;&#25915;&#20987;&#65292;&#32780;&#20837;&#20405;&#26816;&#27979;&#25216;&#26415;&#20415;&#21487;&#20197;&#20316;&#20026;&#19968;&#31181;&#24456;&#37325;&#35201;&#30340;&#25216;&#26415;&#20026;&#25105;&#20204;&#25152;&#29992;&#12290;</div><div class="t m0 xc h4 y20 ff1 fs1 fc0 sc1 ls0 ws0">&#20837;&#20405;&#26816;&#27979;&#31995;<span class="_ _2"></span>&#32479;&#65292;&#20316;&#20026;&#20449;&#24687;<span class="_ _2"></span>&#23433;&#20840;&#20307;&#31995;&#32467;&#26500;<span class="_ _2"></span>&#30340;&#37325;&#35201;&#32452;&#25104;&#37096;<span class="_ _2"></span>&#20998;<span class="_ _4"></span><span class="ff3">,</span>&#26159;&#32593;&#32476;&#23433;<span class="_ _2"></span>&#20840;&#39046;&#22495;&#20013;&#19968;&#20010;<span class="_ _2"></span>&#36739;&#26032;&#30340;</div><div class="t m0 x6 h4 y21 ff1 fs1 fc0 sc1 ls0 ws0">&#35838;&#39064;<span class="_ _2"></span>&#65292;&#26412;<span class="_ _2"></span>&#23567;&#32452;<span class="_ _2"></span>&#36890;&#36807;<span class="_ _2"></span>&#23454;&#36341;<span class="_ _2"></span>&#28145;&#20837;<span class="_ _2"></span>&#29702;&#35299;<span class="_ _2"></span>&#20837;&#20405;<span class="_ _2"></span>&#26816;&#27979;<span class="_ _2"></span>&#31995;&#32479;&#30340;<span class="_ _2"></span>&#21407;&#29702;<span class="_ _2"></span>&#21644;&#24037;<span class="_ _2"></span>&#20316;&#26041;<span class="_ _2"></span>&#24335;&#65292;<span class="_ _2"></span>&#29087;&#24713;<span class="_ _2"></span>&#20837;&#20405;<span class="_ _2"></span>&#26816;&#27979;<span class="_ _2"></span>&#31995;&#32479;<span class="_ _2"></span>&#24037;&#20855;</div><div class="t m0 x6 h4 y22 ff3 fs1 fc0 sc1 ls0 ws0">snort<span class="_ _1"> </span><span class="ff1">&#30340;&#37197;&#32622;&#21644;&#20351;&#29992;&#12290;&#20855;&#20307;&#20869;&#23481;&#35201;&#27714;&#22914;&#19979;&#65306;</span></div><div class="t m0 xc h4 y23 ff1 fs1 fc0 sc1 ls0 ws0">&#29702;&#35299;&#20837;&#20405;&#26816;&#27979;&#30340;&#20316;&#29992;&#21644;&#21407;&#29702;</div><div class="t m0 xc h4 y24 ff1 fs1 fc0 sc1 ls0 ws0">&#29702;&#35299;&#35823;&#29992;&#26816;&#27979;&#21644;&#24322;&#24120;&#26816;&#27979;&#30340;&#21306;&#21035;</div><div class="t m0 xc h4 y25 ff1 fs1 fc0 sc1 ls0 ws0">&#25484;&#25569;<span class="_ _1"> </span><span class="ff3">Snort<span class="_ _1"> </span></span>&#30340;&#23433;&#35013;&#12289;&#37197;&#32622;&#21644;&#20351;&#29992;&#31561;&#23454;&#29992;&#25216;&#26415;</div><div class="t m0 x6 h7 y26 ff2 fs3 fc0 sc1 ls0 ws0">2<span class="_ _3"> </span><span class="ff1 sc0">&#20837;&#20405;&#26816;&#27979;&#27010;&#36848;</span></div><div class="t m0 xc h4 y27 ff2 fs1 fc0 sc1 ls0 ws0">2.1<span class="_ _1"> </span><span class="ff1 sc0">&#20837;&#20405;&#26816;&#27979;&#27010;&#24565;&#21450;&#20854;&#21151;&#33021;</span></div><div class="t m0 xc h4 y28 ff1 fs1 fc0 sc1 ls0 ws0">&#20837;&#20405;<span class="_ _2"></span>&#26816;&#27979;<span class="_ _2"></span>&#26159;&#25351;<span class="_ _2"></span>&#23545;&#20837;<span class="_ _2"></span>&#20405;&#34892;<span class="_ _2"></span>&#20026;&#30340;<span class="_ _2"></span>&#21457;&#29616;<span class="_ _2"></span>&#12289;&#25253;<span class="_ _2"></span>&#35686;&#21644;<span class="_ _2"></span>&#21709;&#24212;&#65292;<span class="_ _2"></span>&#23427;&#36890;<span class="_ _2"></span>&#36807;&#23545;<span class="_ _2"></span>&#35745;&#31639;<span class="_ _2"></span>&#26426;&#32593;<span class="_ _2"></span>&#32476;&#25110;<span class="_ _2"></span>&#35745;&#31639;<span class="_ _2"></span>&#26426;&#31995;<span class="_ _2"></span>&#32479;&#20013;</div><div class="t m0 xd h8 y29 ff3 fs4 fc0 sc1 ls0 ws0">1</div></div></div><div class="pi" data-data='{"ctm":[1.611850,0.000000,0.000000,1.611850,0.000000,0.000000]}'></div></div> </body> </html>
评论
    相关推荐
    • For_a_comprehensive_network_intrusion_security_sol
      一个针对网络入侵的综合安全解决方案,希望对需要的人又帮助!
    • Cetus:用于欺骗作弊引擎的WebAssembly游戏的浏览器扩展
      Cetus是一个用于入侵WebAssembly游戏的浏览器扩展程序(已在Chrome和Firefox上测试)。 Cetus实现了用户熟悉的许多功能 记忆搜寻 点(使用通过二进制检测) 记忆冻结 代码反汇编 代码补丁 Cetus这个名字来自拉丁语...
    • snafu-py:用于分析语义流利性数据和估计语义网络的库
      检测入侵 计算平均获取年龄和单词频率 ...更多的! SNAFU还实现了多种网络估计方法,使您可以对数据执行网络分析(请参阅)。 这些方法已实现: U-INVITE网络 探路者网络 基于相关的网络 天真的随机游走网络 概念...
    • PHPIDS-master结构化的PHP安全层的库
      这套入侵检测系统既不提供任何缓和及杀毒机制,也不会对恶意输入内容进行过滤,其作用单纯为识别出攻击者们针对站点进行的恶意活动、并以大家需要的方式作出及时提醒。凭借着一整套经过实践检验及相当严格的过滤规则...
    • project_alias:Alias是一个可教授的“寄生虫”,旨在在定制和隐私方面为用户提供对其智能助手的更多控制。...
      Project Alias是用于入侵智能家居设备的开源寄生虫。 训练设备的自定义唤醒名称和命令,同时用噪音干扰其内置麦克风。 通过更改性别或国籍为他们的算法引入虚假标签。 在阅读有关该项目的更多信息 该存储库已更新至...
    • PHPIDS-master结构化的PHP安全层的库.zip
      这套入侵检测系统既不提供任何缓和及杀毒机制,也不会对恶意输入内容进行过滤,其作用单纯为识别出攻击者们针对站点进行的恶意活动、并以大家需要的方式作出及时提醒。凭借着一整套经过实践检验及相当严格的过滤规则...
    • machine-learning-classification:机器学习分类简介
      借助机器学习,可以预测诸如在急诊室的等待时间,设备故障以及检测网络入侵等情况。 这都是关于在训练数据上训练算法,然后将其知识用于对未知数据进行预测。 一种常见用途是预测垃圾邮件。 通过教授垃圾邮件特征...
    • 匹配.rar
      经典与最新的字符串匹配技术介绍,搜索、网络安全领域都用得到~
    • NIDSTesting-开源
      这是一个高度可配置和灵活的测试工具,能够根据用户提供的参数集生成不同的网络数据包流,用于在NIDS-网络入侵检测系统上进行性能和健壮性测试。
    • 3DES加密算法源代码.rar
      DES加密源代码,用3DES加密算法。 加密强度高,到目前为止,还无人能够破解!