<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8">
<meta name="generator" content="pdf2htmlEX">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css">
<link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css">
<link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/raw.css">
<script src="https://static.pudn.com/base/js/compatibility.min.js"></script>
<script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script>
<script>
try{
pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});
}catch(e){}
</script>
<title></title>
</head>
<body>
<div id="sidebar" style="display: none">
<div id="outline">
</div>
</div>
<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/bg1.jpg"><div class="c x0 y1 w2 h2"><div class="t m0 x1 h3 y2 ff1 fs0 fc0 sc0 ls0 ws0">浅谈入侵检测工具<span class="_ _0"> </span><span class="ff2 sc1">Snort</span></div><div class="t m0 x2 h4 y3 ff1 fs1 fc0 sc1 ls0 ws0">王能会(<span class="ff3">20091308005</span>)</div><div class="t m0 x3 h4 y4 ff1 fs1 fc0 sc1 ls0 ws0">刘<span class="ff3"> </span>习(<span class="ff3">20091308010</span>)</div><div class="t m0 x4 h4 y5 ff3 fs1 fc0 sc1 ls0 ws0">(2009<span class="_ _1"> </span><span class="ff1">级计算机科学与技术(</span>1<span class="ff1">)班</span>)</div><div class="t m0 x5 h4 y6 ff3 fs1 fc0 sc1 ls0 ws0">(<span class="ff1">计算机与软件学院</span> <span class="ff1">南京信息工程大学</span>)</div><div class="t m0 x6 h4 y7 ff1 fs1 fc0 sc0 ls0 ws0">摘要<span class="ff2 sc1">:<span class="ff1">入侵检测系统<span class="ff3">(IntrusionDetectionSystem, IDS),</span>是信息安全体系结构的重要组成部分。</span></span></div><div class="t m0 x6 h4 y8 ff1 fs1 fc0 sc1 ls0 ws0">简要介绍了入侵检测系统的概况、功能、分类和原理。<span class="ff3">Snort<span class="_ _1"> </span></span>是一个开源的入侵检测系统。</div><div class="t m0 x6 h4 y9 ff1 fs1 fc0 sc1 ls0 ws0">从系统特点、结构、流程等方面对<span class="_ _1"> </span><span class="ff3">Snort<span class="_ _1"> </span></span>做了较为全面的探讨。基于以上原理介绍,通过</div><div class="t m0 x6 h4 ya ff1 fs1 fc0 sc1 ls0 ws0">在<span class="_ _1"> </span><span class="ff3">windows<span class="_ _1"> </span></span>环境下配置<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>进行简单的实验,然后编写简易的<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>规则来测试其基本性</div><div class="t m0 x6 h4 yb ff1 fs1 fc0 sc1 ls0 ws0">能,来直观感性地展现<span class="_ _1"> </span><span class="ff3">snort<span class="_ _1"> </span></span>的工作过程和初步应用。</div><div class="t m0 x6 h4 yc ff1 fs1 fc0 sc0 ls0 ws0">关键词:<span class="ff3 sc1">Snort<span class="ff1">;入侵检测;信息安全</span></span></div><div class="t m0 x7 h5 yd ff3 fs2 fc0 sc1 ls0 ws0">A probe into Snort, tool for Intrusion Detection</div><div class="t m0 x8 h6 ye ff3 fs1 fc0 sc1 ls0 ws0">Nenghui Wang(20091308005)</div><div class="t m0 x9 h6 yf ff3 fs1 fc0 sc1 ls0 ws0">Xi Liu(20091308010)</div><div class="t m0 xa h6 y10 ff3 fs1 fc0 sc1 ls0 ws0">(Computer Science and Technology Grade 2009 Class 1 )</div><div class="t m0 xb h6 y11 ff3 fs1 fc0 sc1 ls0 ws0">(Computer and Software College, Nanjing University of Information and Technology)</div><div class="t m0 x6 h6 y12 ff2 fs1 fc0 sc1 ls0 ws0">Abstract:<span class="ff3">Intrusion detection system (IDS) is the key component of the architecture of </span></div><div class="t m0 x6 h6 y13 ff3 fs1 fc0 sc1 ls0 ws0">information security. The summary, functions, classification and principle of intrusion detection </div><div class="t m0 x6 h6 y14 ff3 fs1 fc0 sc1 ls0 ws0">system are discussed. Snort is an instrusion detection system in the field of open source software. </div><div class="t m0 x6 h6 y15 ff3 fs1 fc0 sc1 ls0 ws0">A detailed dissection to snort in the aspect of characteristics, structure, procedure is provided. </div><div class="t m0 x6 h6 y16 ff3 fs1 fc0 sc1 ls0 ws0">Based on the principle provided above, configuration of snort under the windows OS </div><div class="t m0 x6 h6 y17 ff3 fs1 fc0 sc1 ls0 ws0">environment, a simple experiment and making up some rules for snort will help check out </div><div class="t m0 x6 h6 y18 ff3 fs1 fc0 sc1 ls0 ws0">fundamental functions of snort, meanwhile showing the working process and primary application </div><div class="t m0 x6 h6 y19 ff3 fs1 fc0 sc1 ls0 ws0">intuitively. </div><div class="t m0 x6 h6 y1a ff2 fs1 fc0 sc1 ls0 ws0">Keywords:<span class="ff3"> Snort ; Intrusiondetection; Information<span class="_ _2"></span>security</span></div><div class="t m0 x6 h7 y1b ff2 fs3 fc0 sc1 ls0 ws0">1<span class="_ _3"> </span><span class="ff1 sc0">引言</span></div><div class="t m0 xc h4 y1c ff1 fs1 fc0 sc1 ls0 ws0">互联网络的蓬勃发展给人们的工作生活带来极大的便利。然而,随着现代化网络应用</div><div class="t m0 x6 h4 y1d ff1 fs1 fc0 sc1 ls0 ws0">的普及,伴随而来的网络不安全因素也给网络信息安全带来了严峻挑战,传统的网络安全</div><div class="t m0 x6 h4 y1e ff1 fs1 fc0 sc1 ls0 ws0">技术已经很难对付这些日益严重的安全威胁,所以我们就有必要去开发专门的工具去避免</div><div class="t m0 x6 h4 y1f ff1 fs1 fc0 sc1 ls0 ws0">这些不安全因素的攻击,而入侵检测技术便可以作为一种很重要的技术为我们所用。</div><div class="t m0 xc h4 y20 ff1 fs1 fc0 sc1 ls0 ws0">入侵检测系<span class="_ _2"></span>统,作为信息<span class="_ _2"></span>安全体系结构<span class="_ _2"></span>的重要组成部<span class="_ _2"></span>分<span class="_ _4"></span><span class="ff3">,</span>是网络安<span class="_ _2"></span>全领域中一个<span class="_ _2"></span>较新的</div><div class="t m0 x6 h4 y21 ff1 fs1 fc0 sc1 ls0 ws0">课题<span class="_ _2"></span>,本<span class="_ _2"></span>小组<span class="_ _2"></span>通过<span class="_ _2"></span>实践<span class="_ _2"></span>深入<span class="_ _2"></span>理解<span class="_ _2"></span>入侵<span class="_ _2"></span>检测<span class="_ _2"></span>系统的<span class="_ _2"></span>原理<span class="_ _2"></span>和工<span class="_ _2"></span>作方<span class="_ _2"></span>式,<span class="_ _2"></span>熟悉<span class="_ _2"></span>入侵<span class="_ _2"></span>检测<span class="_ _2"></span>系统<span class="_ _2"></span>工具</div><div class="t m0 x6 h4 y22 ff3 fs1 fc0 sc1 ls0 ws0">snort<span class="_ _1"> </span><span class="ff1">的配置和使用。具体内容要求如下:</span></div><div class="t m0 xc h4 y23 ff1 fs1 fc0 sc1 ls0 ws0">理解入侵检测的作用和原理</div><div class="t m0 xc h4 y24 ff1 fs1 fc0 sc1 ls0 ws0">理解误用检测和异常检测的区别</div><div class="t m0 xc h4 y25 ff1 fs1 fc0 sc1 ls0 ws0">掌握<span class="_ _1"> </span><span class="ff3">Snort<span class="_ _1"> </span></span>的安装、配置和使用等实用技术</div><div class="t m0 x6 h7 y26 ff2 fs3 fc0 sc1 ls0 ws0">2<span class="_ _3"> </span><span class="ff1 sc0">入侵检测概述</span></div><div class="t m0 xc h4 y27 ff2 fs1 fc0 sc1 ls0 ws0">2.1<span class="_ _1"> </span><span class="ff1 sc0">入侵检测概念及其功能</span></div><div class="t m0 xc h4 y28 ff1 fs1 fc0 sc1 ls0 ws0">入侵<span class="_ _2"></span>检测<span class="_ _2"></span>是指<span class="_ _2"></span>对入<span class="_ _2"></span>侵行<span class="_ _2"></span>为的<span class="_ _2"></span>发现<span class="_ _2"></span>、报<span class="_ _2"></span>警和<span class="_ _2"></span>响应,<span class="_ _2"></span>它通<span class="_ _2"></span>过对<span class="_ _2"></span>计算<span class="_ _2"></span>机网<span class="_ _2"></span>络或<span class="_ _2"></span>计算<span class="_ _2"></span>机系<span class="_ _2"></span>统中</div><div class="t m0 xd h8 y29 ff3 fs4 fc0 sc1 ls0 ws0">1</div></div></div><div class="pi" data-data='{"ctm":[1.611850,0.000000,0.000000,1.611850,0.000000,0.000000]}'></div></div>
</body>
</html>
<div id="pf2" class="pf w0 h0" data-page-no="2"><div class="pc pc2 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/bg2.jpg"><div class="c x0 y1 w2 h2"><div class="t m0 x6 h4 y2a ff1 fs1 fc0 sc1 ls0 ws0">的若<span class="_ _2"></span>干关<span class="_ _2"></span>键点<span class="_ _2"></span>收集<span class="_ _2"></span>信息<span class="_ _2"></span>并对<span class="_ _2"></span>其进<span class="_ _2"></span>行分<span class="_ _2"></span>析,<span class="_ _2"></span>从中发<span class="_ _2"></span>现网<span class="_ _2"></span>络或<span class="_ _2"></span>系统<span class="_ _2"></span>中是<span class="_ _2"></span>否有<span class="_ _2"></span>违反<span class="_ _2"></span>安全<span class="_ _2"></span>策略<span class="_ _2"></span>的行</div><div class="t m0 x6 h4 y2b ff1 fs1 fc0 sc1 ls0 ws0">为<span class="_ _2"></span>和<span class="_ _2"></span>被<span class="_ _2"></span>攻<span class="_ _2"></span>击<span class="_ _2"></span>的<span class="_ _2"></span>迹<span class="_ _2"></span>象<span class="_ _2"></span>。<span class="_ _2"></span>入<span class="_ _2"></span>侵<span class="_ _2"></span>检<span class="_ _2"></span>测<span class="_ _2"></span>系<span class="_ _2"></span>统<span class="_ _5"></span><span class="ff3">(Intrusion <span class="_ _2"></span>Detection <span class="_ _2"></span>System, <span class="_ _2"></span>IDS)<span class="_ _2"></span></span>是<span class="_ _2"></span>完<span class="_ _2"></span>成<span class="_ _2"></span>入<span class="_ _2"></span>侵<span class="_ _2"></span>检<span class="_ _2"></span>测<span class="_ _2"></span>功<span class="_ _2"></span>能<span class="_ _5"></span>的</div><div class="t m0 x6 h4 y2c ff1 fs1 fc0 sc1 ls0 ws0">软件和硬件的集合。</div><div class="t m0 xc h4 y3 ff1 fs1 fc0 sc1 ls0 ws0">入侵检测的功能主要体现在以下几个方面:</div><div class="t m0 xc h4 y4 ff1 fs1 fc0 sc1 ls0 ws0">监视并分析用户和系统的活动;</div><div class="t m0 xc h4 y5 ff1 fs1 fc0 sc1 ls0 ws0">核查系统配置和漏洞;</div><div class="t m0 xc h4 y6 ff1 fs1 fc0 sc1 ls0 ws0">识别已知的攻击行为并报警;</div><div class="t m0 xc h4 y7 ff1 fs1 fc0 sc1 ls0 ws0">统计分析异常行为;</div><div class="t m0 xc h4 y8 ff1 fs1 fc0 sc1 ls0 ws0">评估系统关键资源和数据文件的完<span class="ff4">整</span>性;</div><div class="t m0 xc h4 y9 ff4 fs1 fc0 sc1 ls0 ws0">操<span class="ff1">作系统的</span>审<span class="ff1">计</span>跟踪管<span class="ff1">理,并识别违反安全策略的用户行为。</span></div><div class="t m0 xc h4 y2d ff2 fs1 fc0 sc1 ls0 ws0">2.2<span class="_ _1"> </span><span class="ff1 sc0">入侵检测的分类</span></div><div class="t m0 xc h4 yc ff4 fs1 fc0 sc1 ls0 ws0">根<span class="ff1">据<span class="_ _3"> </span><span class="ff3">IDS<span class="_ _1"> </span></span>检<span class="_ _2"></span>测对<span class="_ _2"></span>象和<span class="_ _2"></span>工作<span class="_ _2"></span>方式<span class="_ _2"></span>的不<span class="_ _2"></span></span>同<span class="_ _2"></span><span class="ff1">,可<span class="_ _2"></span>以</span>将<span class="_ _6"> </span><span class="ff3">IDS<span class="_ _1"> </span><span class="ff1">分<span class="_ _2"></span>为基<span class="_ _2"></span>于网<span class="_ _2"></span>络的<span class="_ _3"> </span></span>IDS(<span class="_ _2"></span><span class="ff1">简</span></span>称<span class="_ _3"> </span><span class="ff3">NIDS)<span class="ff1">和</span></span></div><div class="t m0 x6 h4 y2e ff1 fs1 fc0 sc1 ls0 ws0">基于主机的<span class="_ _3"> </span><span class="ff3">IDS(</span>简<span class="_ _2"></span><span class="ff4">称<span class="_ _1"> </span><span class="ff3">HIDS)</span></span>。<span class="ff3">NIDS<span class="_ _1"> </span></span>和<span class="_ _3"> </span><span class="ff3">HIDS<span class="_ _1"> </span></span>互为<span class="ff4">补充</span>,<span class="_ _2"></span><span class="ff4">两者</span>的结合使<span class="_ _2"></span>用使<span class="ff4">得<span class="_ _6"> </span><span class="ff3">IDS<span class="_ _1"> </span></span></span>有了<span class="ff4">更强</span></div><div class="t m0 x6 h4 y2f ff1 fs1 fc0 sc1 ls0 ws0">的检测能<span class="ff4">力</span>。</div><div class="t m0 xc h4 y30 ff3 fs1 fc0 sc1 ls0 ws0">1<span class="ff1">)基于主机的入侵检测系统。</span></div><div class="t m0 xc h4 y31 ff3 fs1 fc0 sc1 ls0 ws0">HIDS<span class="_ _1"> </span><span class="ff4">历史最久<span class="ff1">,</span>最早<span class="ff1">用于</span>审<span class="ff1">计用户的活动,</span>比<span class="ff1">如用户</span>登录<span class="ff1">、</span>命令操<span class="ff1">作、应用程</span>序<span class="ff1">使用</span></span></div><div class="t m0 x6 h4 y32 ff1 fs1 fc0 sc1 ls0 ws0">资源<span class="ff4">情</span>况等<span class="_ _2"></span>。<span class="ff3">HIDS<span class="_"> </span></span>主要使用主机的<span class="ff4">审</span>计<span class="ff4">记<span class="_ _2"></span>录</span>和日<span class="ff4">志</span>文件<span class="_ _2"></span>作为<span class="ff4">输</span>入,<span class="ff4">某<span class="_ _2"></span></span>些<span class="_ _6"> </span><span class="ff3">H<span class="_ _2"></span>IDS<span class="_ _1"> </span></span>也会主动与</div><div class="t m0 x6 h4 y33 ff1 fs1 fc0 sc1 ls0 ws0">主机<span class="_ _2"></span>系<span class="_ _2"></span>统进<span class="_ _2"></span>行<span class="_ _2"></span><span class="ff4">交</span>互<span class="_ _2"></span>以<span class="_ _2"></span><span class="ff4">获<span class="_ _2"></span>得</span>不<span class="_ _2"></span><span class="ff4">存<span class="_ _2"></span></span>在于<span class="_ _2"></span>系<span class="_ _2"></span>统日<span class="_ _2"></span><span class="ff4">志<span class="_ _2"></span></span>的<span class="_ _2"></span>信息<span class="_ _2"></span>。<span class="_ _5"></span><span class="ff3"> <span class="_ _2"></span>HIDS<span class="_ _1"> </span></span>所<span class="_ _2"></span>收<span class="_ _2"></span>集的<span class="_ _2"></span>信<span class="_ _2"></span>息集<span class="_ _2"></span>中<span class="_ _2"></span>在系<span class="_ _2"></span>统<span class="_ _2"></span><span class="ff4">调<span class="_ _2"></span></span>用</div><div class="t m0 x6 h4 y34 ff1 fs1 fc0 sc1 ls0 ws0">和应用<span class="ff4">层审</span>计上,试<span class="ff4">图</span>从日<span class="ff4">志寻找滥</span>用和入侵<span class="ff4">事</span>件的<span class="ff4">线索</span>。<span class="ff3">HIDS<span class="_ _1"> </span></span>用于<span class="ff4">保护</span>单<span class="ff4">台</span>主机不<span class="ff4">受</span>网</div><div class="t m0 x6 h4 y35 ff1 fs1 fc0 sc1 ls0 ws0">络攻击行为的侵<span class="ff4">害</span>,<span class="ff4">需</span>要安装在<span class="ff4">保护</span>的主机上。</div><div class="t m0 xc h4 y36 ff3 fs1 fc0 sc1 ls0 ws0">2<span class="ff1">)基于网络的入侵检测系统。</span></div><div class="t m0 xc h4 y37 ff3 fs1 fc0 sc1 ls0 ws0">NIDS<span class="_ _1"> </span><span class="ff1">是在网络中的<span class="ff4">某</span>一点被动地监<span class="ff4">听</span>网络上传<span class="ff4">输</span>的原<span class="ff4">始</span>流<span class="ff4">量</span>,并通过<span class="ff4">协议</span>分析、特<span class="ff4">征</span>、</span></div><div class="t m0 x6 h4 y38 ff1 fs1 fc0 sc1 ls0 ws0">统计分析等分析<span class="ff4">手段</span>发现<span class="ff4">当前</span>发生的攻击行为。<span class="ff3">NIDS<span class="_ _1"> </span></span>通过对流<span class="ff4">量</span>分析<span class="ff4">提取牲模</span>式,<span class="ff4">再</span>与已</div><div class="t m0 x6 h4 y39 ff1 fs1 fc0 sc1 ls0 ws0">知攻击<span class="ff4">牲相匹</span>配或与<span class="ff4">正</span>常网络行为原<span class="ff4">形相比</span>较来识别攻击<span class="ff4">事</span>件。</div><div class="t m0 xc h4 y3a ff2 fs1 fc0 sc1 ls0 ws0">2.3<span class="_ _1"> </span><span class="ff1 sc0">入侵检测系统</span></div><div class="t m0 xc h4 y3b ff3 fs1 fc0 sc1 ls0 ws0">1<span class="ff1">)入侵检测系统的特点</span></div><div class="t m0 xc h4 y3c ff1 fs1 fc0 sc1 ls0 ws0">入<span class="_ _2"></span>侵<span class="_ _2"></span>检<span class="_ _2"></span>测<span class="_ _2"></span>系<span class="_ _5"></span>统<span class="_ _2"></span><span class="ff3">(Intrusion <span class="_ _2"></span>Detection<span class="_ _2"></span> System)<span class="_ _5"></span></span>是<span class="_ _2"></span>对<span class="_ _2"></span><span class="ff4">防<span class="_ _5"></span>火墙<span class="_ _5"></span></span>有益<span class="_ _5"></span>的<span class="ff4">补<span class="_ _5"></span>充<span class="_ _2"></span></span>,<span class="_ _2"></span>它<span class="_ _2"></span>对<span class="_ _2"></span>网<span class="_ _2"></span>络<span class="_ _5"></span>和主<span class="_ _5"></span>机行</div><div class="t m0 x6 h4 y3d ff1 fs1 fc0 sc1 ls0 ws0">为进行检测,<span class="ff4">提供</span>对内部攻击、<span class="ff4">外</span>部攻击和误<span class="ff4">操</span>作的实<span class="ff4">时</span>监<span class="ff4">控</span>,<span class="ff4">增强</span>了网络的安全性。</div><div class="t m0 xc h4 y1c ff1 fs1 fc0 sc1 ls0 ws0">在安<span class="_ _2"></span>全<span class="ff4">防<span class="_ _2"></span>范</span>方<span class="_ _2"></span>面,<span class="_ _2"></span>入侵<span class="_ _2"></span>检测<span class="_ _2"></span>系统<span class="_ _2"></span>可以<span class="_ _2"></span>实现<span class="_ _2"></span><span class="ff4">事<span class="_ _2"></span>前</span>警<span class="_ _2"></span><span class="ff4">告</span>、<span class="_ _2"></span><span class="ff4">事</span>中<span class="_ _2"></span><span class="ff4">防护<span class="_ _2"></span></span>和<span class="ff4">事<span class="_ _2"></span></span>后<span class="ff4">取<span class="_ _2"></span>证</span>。<span class="_ _2"></span>入侵<span class="_ _2"></span>检测</div><div class="t m0 x6 h4 y1d ff1 fs1 fc0 sc1 ls0 ws0">系统<span class="_ _2"></span>能<span class="ff4">够<span class="_ _2"></span></span>在入<span class="_ _2"></span>侵攻<span class="_ _2"></span>击行<span class="_ _2"></span>为对<span class="_ _2"></span>网络<span class="_ _2"></span>系统<span class="_ _2"></span><span class="ff4">造<span class="_ _2"></span></span>成<span class="ff4">危<span class="_ _2"></span>害前<span class="_ _2"></span></span>,及<span class="_ _2"></span><span class="ff4">时</span>检<span class="_ _2"></span>测<span class="ff4">到<span class="_ _2"></span></span>入侵<span class="_ _2"></span>攻击<span class="_ _2"></span>的发<span class="_ _2"></span>生,<span class="_ _2"></span>并进<span class="_ _2"></span>行报</div><div class="t m0 x6 h4 y1e ff1 fs1 fc0 sc1 ls0 ws0">警;<span class="_ _2"></span>入侵<span class="_ _2"></span>攻击<span class="_ _2"></span>发生<span class="_ _2"></span><span class="ff4">时</span>,<span class="_ _2"></span>入侵<span class="_ _2"></span>检测<span class="_ _2"></span>系统<span class="_ _2"></span>可以<span class="_ _2"></span>通过<span class="_ _2"></span>与<span class="_ _2"></span><span class="ff4">防火<span class="_ _2"></span>墙</span>联<span class="_ _2"></span>动等<span class="_ _2"></span>方式<span class="_ _2"></span>进行<span class="_ _2"></span>报警<span class="_ _2"></span>及动<span class="_ _2"></span><span class="ff4">态防<span class="_ _2"></span>护</span>;</div><div class="t m0 x6 h4 y1f ff1 fs1 fc0 sc1 ls0 ws0">被入侵攻击后,入侵检测系统可以<span class="ff4">提供详细</span>的攻击信息日<span class="ff4">志</span>,便于<span class="ff4">取证</span>分析。</div><div class="t m0 xc h4 y20 ff4 fs1 fc0 sc1 ls0 ws0">相<span class="ff1">对<span class="_ _2"></span>于</span>防<span class="_ _2"></span>火墙<span class="_ _2"></span>提供<span class="_ _2"></span><span class="ff1">的</span>静<span class="_ _2"></span>态防<span class="_ _2"></span>护<span class="_ _2"></span><span class="ff1">而言<span class="_ _2"></span>,入<span class="_ _2"></span>侵检<span class="_ _2"></span>测系<span class="_ _2"></span>统</span>侧<span class="_ _2"></span><span class="ff1">重于<span class="_ _2"></span></span>提供<span class="_ _2"></span><span class="ff1">动</span>态<span class="_ _2"></span><span class="ff1">实</span>时<span class="_ _2"></span><span class="ff1">检测<span class="_ _2"></span></span>防护<span class="_ _2"></span><span class="ff1">,因</span></div><div class="t m0 x6 h4 y21 ff4 fs1 fc0 sc1 ls0 ws0">此防火墙<span class="ff1">和入侵检测系统的结合,能</span>够<span class="ff1">给网络带来</span>更<span class="ff1">全面的</span>防护<span class="ff1">。</span></div><div class="t m0 xc h4 y22 ff3 fs1 fc0 sc1 ls0 ws0">2<span class="ff1">)入侵检测系统的实现原理</span></div><div class="t m0 xc h4 y23 ff1 fs1 fc0 sc1 ls0 ws0">入侵检测系统的实现技术可以简单地分为<span class="ff4">两</span>大类:基于特<span class="ff4">征</span>的检测和基于异常的检测。</div><div class="t m0 xc h4 y24 ff1 fs1 fc0 sc1 ls0 ws0">基于<span class="_ _2"></span>特<span class="ff4">征<span class="_ _2"></span></span>的检<span class="_ _2"></span>测技<span class="_ _2"></span>术主<span class="_ _2"></span>要<span class="_ _2"></span><span class="ff4">包括<span class="_ _2"></span>模</span>式<span class="_ _2"></span><span class="ff4">匹</span>配<span class="_ _2"></span>和<span class="ff4">协<span class="_ _2"></span>议</span>分<span class="_ _2"></span>析<span class="ff4">两<span class="_ _2"></span></span>种主<span class="_ _2"></span>要检<span class="_ _2"></span>测方<span class="_ _2"></span><span class="ff4">法</span>。<span class="_ _2"></span><span class="ff4">模</span>式<span class="_ _2"></span><span class="ff4">匹</span>配<span class="_ _2"></span>就是</div><div class="t m0 x6 h4 y25 ff4 fs1 fc0 sc1 ls0 ws0">将<span class="ff1">已<span class="_ _2"></span>知入<span class="_ _2"></span>侵</span>事<span class="_ _2"></span><span class="ff1">件</span>悼<span class="_ _2"></span><span class="ff1">念</span>到<span class="_ _2"></span><span class="ff1">网<span class="_ _2"></span>络入侵<span class="_ _2"></span>和系<span class="_ _2"></span>统误<span class="_ _2"></span>用知<span class="_ _2"></span>识<span class="_ _2"></span></span>库<span class="ff1">中<span class="_ _2"></span>,对<span class="_ _2"></span>入侵<span class="_ _2"></span>检测<span class="_ _2"></span>系统<span class="_ _2"></span></span>悼<span class="ff1">念<span class="_ _2"></span>的信<span class="_ _2"></span>息和<span class="_ _2"></span>知识</span></div><div class="t m0 x6 h4 y3e ff4 fs1 fc0 sc1 ls0 ws0">库<span class="ff1">中<span class="_ _2"></span>的规<span class="_ _2"></span>则进<span class="_ _2"></span>行</span>比<span class="_ _2"></span><span class="ff1">较,<span class="_ _2"></span>以发<span class="_ _2"></span>现入<span class="_ _2"></span>侵行<span class="_ _2"></span>为。<span class="_ _2"></span></span>协<span class="_ _2"></span>议<span class="ff1">分<span class="_ _2"></span>析技<span class="_ _2"></span>术则<span class="_ _2"></span>对数<span class="_ _2"></span>据</span>包<span class="_ _2"></span><span class="ff1">进行<span class="_ _2"></span></span>协议<span class="_ _2"></span><span class="ff1">解析<span class="_ _2"></span>后进<span class="_ _2"></span>行分</span></div><div class="t m0 x6 h4 y3f ff1 fs1 fc0 sc1 ls0 ws0">析。<span class="_ _2"></span>这种<span class="_ _2"></span>技术<span class="_ _2"></span><span class="ff4">需</span>要<span class="_ _2"></span><span class="ff4">首先<span class="_ _2"></span>捕捉<span class="_ _2"></span></span>数<span class="_ _2"></span>据<span class="ff4">包<span class="_ _2"></span></span>,然<span class="_ _2"></span>后对<span class="_ _2"></span>数据<span class="_ _2"></span><span class="ff4">包</span>进<span class="_ _2"></span>行解<span class="_ _2"></span>析,<span class="_ _2"></span><span class="ff4">包括<span class="_ _2"></span></span>网络<span class="_ _2"></span><span class="ff4">协议<span class="_ _2"></span></span>分析<span class="_ _2"></span>和<span class="ff4">命<span class="_ _2"></span>令</span>解</div><div class="t m0 x6 h4 y40 ff1 fs1 fc0 sc1 ls0 ws0">析,<span class="ff4">即</span>使在<span class="ff4">高负载</span>的<span class="ff4">调整</span>网络上,也能<span class="ff4">逐</span>个分析所有的数据<span class="ff4">包</span>。</div><div class="t m0 xc h4 y28 ff1 fs1 fc0 sc1 ls0 ws0">基于<span class="_ _2"></span>异常<span class="_ _2"></span>的检<span class="_ _2"></span>测技<span class="_ _2"></span>术<span class="ff4">只<span class="_ _2"></span>需<span class="_ _2"></span></span>收集<span class="_ _2"></span><span class="ff4">相</span>关<span class="_ _2"></span>的数<span class="_ _2"></span>据,<span class="_ _2"></span>和所<span class="_ _2"></span><span class="ff4">维护<span class="_ _2"></span></span>的知<span class="_ _2"></span>识<span class="ff4">库<span class="_ _2"></span></span>规则<span class="_ _2"></span><span class="ff4">比</span>较<span class="_ _2"></span>就能<span class="_ _2"></span>进行<span class="_ _2"></span><span class="ff4">判断<span class="_ _5"></span></span>,</div><div class="t m0 xd h8 y29 ff3 fs4 fc0 sc1 ls0 ws0">2</div></div></div><div class="pi" data-data='{"ctm":[1.611850,0.000000,0.000000,1.611850,0.000000,0.000000]}'></div></div>
<div id="pf3" class="pf w0 h0" data-page-no="3"><div class="pc pc3 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/627a718e5981aa38ef357110/bg3.jpg"><div class="c x0 y1 w2 h2"><div class="t m0 x6 h4 y2a ff1 fs1 fc0 sc1 ls0 ws0">检测<span class="_ _2"></span><span class="ff4">准确<span class="_ _2"></span>率</span>和<span class="_ _2"></span><span class="ff4">效率<span class="_ _2"></span></span>较<span class="ff4">高<span class="_ _2"></span></span>。<span class="_ _2"></span><span class="ff4">但</span>是<span class="_ _2"></span>,<span class="ff4">该<span class="_ _2"></span></span>技术<span class="_ _2"></span><span class="ff4">需</span>要<span class="_ _2"></span>不<span class="ff4">断<span class="_ _2"></span></span>进行<span class="_ _2"></span>知识<span class="_ _2"></span><span class="ff4">库</span>规<span class="_ _2"></span>则的<span class="_ _2"></span><span class="ff4">升</span>级<span class="_ _2"></span>以对<span class="_ _2"></span>付不<span class="_ _2"></span><span class="ff4">断出<span class="_ _2"></span></span>现的</div><div class="t m0 x6 h4 y2b ff1 fs1 fc0 sc1 ls0 ws0">新攻击<span class="ff4">手法</span>,而<span class="ff4">且</span>,它不能检测<span class="ff4">未</span>知攻击<span class="ff4">手段</span>。</div><div class="t m0 xc h4 y2c ff3 fs1 fc0 sc1 ls0 ws0">3<span class="ff1">)入侵检测系统的部<span class="ff4">署</span>原则</span></div><div class="t m0 xc h4 y3 ff3 fs1 fc0 sc1 ls0 ws0">NIDS<span class="_ _1"> </span><span class="ff4">总<span class="ff1">的来</span>说包括<span class="ff1">探测</span>器<span class="ff1">和</span>控制台两<span class="ff1">大部分。探测</span>器<span class="ff1">是专用的硬件</span>设备<span class="ff1">,</span>负责<span class="ff1">网络数</span></span></div><div class="t m0 x6 h4 y4 ff1 fs1 fc0 sc1 ls0 ws0">据流<span class="_ _2"></span>的<span class="ff4">捕<span class="_ _2"></span>获</span>、<span class="_ _2"></span>分析<span class="_ _2"></span>检测<span class="_ _2"></span>和报<span class="_ _2"></span>警等<span class="_ _2"></span>功能<span class="_ _2"></span>。<span class="_ _2"></span><span class="ff4">控制<span class="_ _2"></span>台</span>是<span class="_ _2"></span><span class="ff4">管</span>理<span class="_ _2"></span>探测<span class="_ _2"></span><span class="ff4">器</span>的<span class="_ _2"></span>工具<span class="_ _2"></span>,它<span class="_ _2"></span><span class="ff4">负责<span class="_ _2"></span>接</span>收<span class="_ _2"></span>探测<span class="_ _2"></span><span class="ff4">器</span>的</div><div class="t m0 x6 h4 y5 ff1 fs1 fc0 sc1 ls0 ws0">检测日<span class="ff4">志</span>数据,并<span class="ff4">提供</span>数据查<span class="ff4">询</span>和报<span class="ff4">告</span>生成等功能,一个<span class="ff4">控制台</span>可以<span class="ff4">管</span>理<span class="ff4">多</span>个探测<span class="ff4">器</span>。</div><div class="t m0 xc h4 y6 ff3 fs1 fc0 sc1 ls0 ws0">HIDS<span class="_ _1"> </span><span class="ff1">安装在被<span class="ff4">保护</span>的机<span class="ff4">器</span>上,在主机系统的<span class="ff4">审</span>计日<span class="ff4">志</span>或<span class="ff4">操</span>作中查<span class="ff4">找</span>信息源进行<span class="ff4">智</span>能分</span></div><div class="t m0 x6 h4 y7 ff1 fs1 fc0 sc1 ls0 ws0">析和<span class="ff4">判断</span>,<span class="ff4">例</span>如<span class="ff4">操</span>作系统日<span class="ff4">志</span>、系统进程、文件<span class="ff4">访问</span>和<span class="ff4">注册表访问</span>等信息。<span class="ff4">由</span>于<span class="_ _1"> </span><span class="ff3">HIDS<span class="_ _1"> </span></span>安</div><div class="t m0 x6 h4 y8 ff1 fs1 fc0 sc1 ls0 ws0">装在<span class="ff4">需</span>要<span class="ff4">保护</span>的主机系统上,这<span class="ff4">将影</span>响应用系统的<span class="ff4">运</span>行<span class="ff4">效率</span>。<span class="ff3">HIDS<span class="_ _1"> </span></span>对主机系统<span class="ff4">固</span>有的日<span class="ff4">志</span></div><div class="t m0 x6 h4 y9 ff1 fs1 fc0 sc1 ls0 ws0">与监视能<span class="ff4">力</span>有很<span class="ff4">高</span>的<span class="ff4">依赖</span>性,它一<span class="ff4">般针</span>对其所在的系统进行检测。</div><div class="t m0 x6 h7 y41 ff2 fs3 fc0 sc1 ls0 ws0">3 Snort<span class="_ _3"> </span><span class="ff1 sc0">简介及原理</span></div><div class="t m0 xc h4 yb ff3 fs1 fc0 sc1 ls0 ws0">Snort <span class="ff1">是一个用<span class="_ _1"> </span></span>C<span class="_ _1"> </span><span class="ff4">语<span class="ff1">言编写的</span>符<span class="ff1">合<span class="_ _1"> </span></span></span>GPL(GNU General Public License)<span class="ff1">规<span class="ff4">范</span>的开<span class="ff4">放</span>源<span class="ff4">码</span>软</span></div><div class="t m0 x6 h4 yc ff1 fs1 fc0 sc1 ls0 ws0">件,因其具有小<span class="ff4">巧灵</span>便、易于配置、检测<span class="ff4">效率高</span>等特性,常被<span class="ff4">称</span>为<span class="ff4">轻量</span>级的<span class="_ _1"> </span><span class="ff3">IDS</span>。<span class="ff3">Snort<span class="_ _1"> </span></span>是</div><div class="t m0 x6 h4 y2e ff1 fs1 fc0 sc1 ls0 ws0">一个<span class="ff4">跨平台</span>、<span class="ff4">轻量</span>级的网络入侵检测工具。</div><div class="t m0 xe h4 y2f ff1 fs1 fc0 sc1 ls0 ws0">从入侵检测的分类上<span class="ff4">看<span class="ff3">, Snort<span class="_ _1"> </span></span></span>应<span class="ff4">当属</span>于基于网络的误用检测。<span class="ff3">Snort<span class="_ _1"> </span><span class="ff4">采</span></span>用基于规则的网</div><div class="t m0 x6 h4 y30 ff1 fs1 fc0 sc1 ls0 ws0">络信息<span class="ff4">搜索</span>机<span class="ff4">制</span>,对数据<span class="ff4">包</span>进行内容的<span class="ff4">模</span>式<span class="ff4">匹</span>配,<span class="ff3"> </span>从中发现入侵和探测行为,<span class="ff3"> <span class="ff4">例</span></span>如<span class="ff3">:buffer </span></div><div class="t m0 x6 h4 y31 ff3 fs1 fc0 sc1 ls0 ws0">overflows<span class="ff1">、</span>stealth port scans<span class="ff1">、</span>Cgi attacks<span class="ff1">、</span>SMB probes<span class="_ _1"> </span><span class="ff1">等。</span>Snort<span class="_ _1"> </span><span class="ff1">的实<span class="ff4">时</span>报警信息可以发<span class="ff4">往</span></span></div><div class="t m0 x6 h4 y32 ff3 fs1 fc0 sc1 ls0 ws0">syslog<span class="ff1">、</span>SMB<span class="ff1">、</span>W<span class="_ _7"></span>inPopupMessage<span class="_ _1"> </span><span class="ff1">或单<span class="ff4">独</span>的<span class="_ _1"> </span></span>alert<span class="_ _1"> </span><span class="ff1">文件。</span>Snort<span class="_ _1"> </span><span class="ff1">可以通过<span class="ff4">命令</span>行进行<span class="ff4">交</span>互,</span> <span class="ff1">并</span></div><div class="t m0 x6 h4 y33 ff1 fs1 fc0 sc1 ls0 ws0">对可<span class="ff4">选</span>的<span class="_ _1"> </span><span class="ff3">BPF<span class="_ _1"> </span><span class="ff4">命令</span></span>进行配置。</div><div class="t m0 xe h4 y34 ff3 fs1 fc0 sc1 ls0 ws0">1<span class="ff1">)</span>Snort<span class="_ _1"> </span><span class="ff1">的特点</span></div><div class="t m0 xe h4 y35 ff1 fs1 fc0 sc1 ls0 ws0">检测机<span class="ff4">制</span>上,<span class="ff3"> </span>它不具有基于规则的误用检测方<span class="ff4">法</span>,<span class="ff4">还</span>有基于异常的检测方<span class="ff4">法由第三</span>方</div><div class="t m0 xe h4 y36 ff4 fs1 fc0 sc1 ls0 ws0">提供<span class="ff1">;</span></div><div class="t m0 xe h4 y37 ff5 fs1 fc0 sc1 ls0 ws0">②<span class="_ _1"> </span><span class="ff1">从体系结构上,<span class="ff4">充</span>分<span class="ff4">考虑</span>了可<span class="ff4">扩</span>展性要求,大<span class="ff4">量</span>使用了<span class="ff4">插</span>件机<span class="ff4">制</span>;</span></div><div class="t m0 xe h4 y38 ff5 fs1 fc0 sc1 ls0 ws0">③<span class="_ _1"> </span><span class="ff1">从功能<span class="ff4">模块</span>上,<span class="ff4">各</span>个<span class="ff4">模块</span>功能<span class="ff4">清晰</span>,<span class="ff4">相</span>对<span class="ff4">独立</span>;</span></div><div class="t m0 xe h4 y39 ff5 fs1 fc0 sc1 ls0 ws0">④<span class="_ _1"> </span><span class="ff1">具有<span class="ff4">良好</span>的编<span class="ff4">码风格</span>。</span></div><div class="t m0 xc h4 y42 ff3 fs1 fc0 sc1 ls0 ws0">Snort<span class="_ _3"> </span><span class="ff1">具<span class="_ _2"></span>有实<span class="_ _2"></span><span class="ff4">时<span class="_ _2"></span></span>数<span class="_ _2"></span>据<span class="_ _2"></span>流<span class="_ _2"></span><span class="ff4">量</span>分<span class="_ _2"></span>析<span class="_ _2"></span>和<span class="_ _6"> </span></span>IP<span class="_"> </span><span class="ff1">数据<span class="_ _2"></span><span class="ff4">包</span>日<span class="_ _2"></span><span class="ff4">志<span class="_ _2"></span></span>分<span class="_ _2"></span>析<span class="_ _2"></span>能<span class="_ _2"></span><span class="ff4">力<span class="_ _2"></span></span>,<span class="_ _2"></span>具有<span class="_ _2"></span><span class="ff4">跨<span class="_ _2"></span>平<span class="_ _2"></span>台<span class="_ _2"></span></span>特<span class="_ _2"></span><span class="ff4">征<span class="_ _2"></span></span>,<span class="_ _2"></span>能<span class="ff4">够<span class="_ _2"></span></span>进<span class="_ _2"></span>行</span></div><div class="t m0 x6 h4 y43 ff4 fs1 fc0 sc1 ls0 ws0">协议<span class="ff1">分析和<span class="_ _2"></span>对内容的</span>搜索<span class="_ _2"></span><span class="ff1">或</span>匹<span class="ff1">配。<span class="ff3">Sno<span class="_ _2"></span>rt<span class="_ _1"> </span></span>能</span>够<span class="ff1">检测不<span class="_ _2"></span></span>同<span class="ff1">的攻击行为<span class="_ _2"></span>,如</span>缓冲<span class="ff1">区</span>溢<span class="_ _2"></span>出<span class="ff1">、</span>端口扫</div><div class="t m0 x6 h4 y3b ff4 fs1 fc0 sc1 ls0 ws0">描<span class="ff1">和</span>拒绝服务<span class="ff1">攻击等,并进行实</span>时<span class="ff1">报警。</span></div><div class="t m0 xc h4 y3c ff3 fs1 fc0 sc1 ls0 ws0">Snort<span class="_ _1"> </span><span class="ff1">可以<span class="ff4">根<span class="_ _2"></span></span>据用户<span class="ff4">事先定<span class="_ _2"></span>义</span>的一些规则<span class="_ _2"></span>分析网络数据<span class="_ _2"></span>流,并<span class="ff4">根</span>据检<span class="_ _2"></span>测结<span class="ff4">果采取</span>一<span class="_ _2"></span><span class="ff4">定</span>的</span></div><div class="t m0 x6 h4 y3d ff1 fs1 fc0 sc1 ls0 ws0">行动<span class="_ _2"></span>。<span class="_ _2"></span><span class="ff3">Snort<span class="_"> </span></span>有<span class="_ _1"> </span><span class="ff3">3<span class="_ _1"> </span></span>种<span class="_ _2"></span>工<span class="_ _2"></span>作<span class="ff4">模<span class="_ _2"></span></span>式<span class="_ _2"></span>,<span class="ff4">即<span class="_ _2"></span>嗅<span class="_ _2"></span></span>探<span class="_ _2"></span><span class="ff4">器</span>、<span class="_ _2"></span>数<span class="_ _2"></span>据<span class="ff4">包<span class="_ _2"></span>记<span class="_ _2"></span>录器<span class="_ _2"></span></span>和<span class="_ _6"> </span><span class="ff3">NIDS<span class="_ _2"></span></span>。<span class="ff4">嗅<span class="_ _2"></span></span>探<span class="_ _2"></span><span class="ff4">器模<span class="_ _2"></span></span>式<span class="_ _2"></span><span class="ff4">仅</span>从<span class="_ _2"></span>网<span class="_ _2"></span>络上</div><div class="t m0 x6 h4 y1c ff4 fs1 fc0 sc1 ls0 ws0">读取<span class="_ _2"></span><span class="ff1">数据<span class="_ _2"></span></span>包<span class="ff1">并<span class="_ _2"></span>作为<span class="_ _2"></span></span>连续<span class="_ _2"></span><span class="ff1">不<span class="_ _2"></span></span>断<span class="ff1">的<span class="_ _2"></span>数据<span class="_ _2"></span>流</span>显<span class="_ _2"></span>示<span class="ff1">在<span class="_ _2"></span></span>终端<span class="_ _2"></span><span class="ff1">上;<span class="_ _2"></span>数据<span class="_ _2"></span></span>包记<span class="_ _2"></span>录器<span class="_ _2"></span>模<span class="ff1">式<span class="_ _2"></span></span>把<span class="ff1">数<span class="_ _2"></span>据</span>包<span class="_ _2"></span>记录<span class="_ _2"></span>到<span class="ff1">硬</span></div><div class="t m0 x6 h4 y1d ff4 fs1 fc0 sc1 ls0 ws0">盘<span class="ff1">上,以</span>备<span class="ff1">分析</span>之<span class="ff1">用;<span class="ff3">NIDS<span class="_ _1"> </span></span></span>模<span class="ff1">式功能</span>强<span class="ff1">大,可以通过配置实现。</span></div><div class="t m0 xc h4 y1e ff3 fs1 fc0 sc1 ls0 ws0">2<span class="ff1">)</span>Snort<span class="_ _1"> </span><span class="ff1">的结构<span class="ff4">由四</span>大软件<span class="ff4">模块</span>组成:</span></div><div class="t m0 xc h4 y1f ff1 fs1 fc0 sc1 ls0 ws0">数据<span class="ff4">包嗅</span>探<span class="ff4">模块</span>。<span class="ff4">负责</span>监<span class="ff4">听</span>网络数据<span class="ff4">包</span>,对网络进行分析。</div><div class="t m0 xc h4 y20 ff4 fs1 fc0 sc1 ls0 ws0">预处<span class="ff1">理</span>模块<span class="ff1">。</span>该模块<span class="ff1">用</span>相<span class="ff1">应的</span>插<span class="ff1">件来检查原</span>始<span class="ff1">数据</span>包<span class="ff1">,从中发现原</span>始<span class="ff1">数据的<span class="ff3">"</span>行为<span class="ff3">"</span>。</span></div><div class="t m0 xc h4 y21 ff1 fs1 fc0 sc1 ls0 ws0">检<span class="_ _2"></span>测<span class="_ _2"></span><span class="ff4">模<span class="_ _2"></span>块<span class="_ _2"></span></span>。<span class="_ _2"></span><span class="ff4">该<span class="_ _2"></span>模<span class="_ _2"></span>块<span class="_ _2"></span></span>是<span class="_ _3"> </span><span class="ff3">Snort<span class="_"> </span></span>的核<span class="_ _2"></span><span class="ff4">心<span class="_ _5"></span>模块<span class="_ _2"></span></span>。<span class="_ _2"></span><span class="ff4">当<span class="_ _2"></span></span>数<span class="_ _2"></span>据<span class="_ _2"></span><span class="ff4">包<span class="_ _2"></span></span>从<span class="_ _5"></span><span class="ff4">预处<span class="_ _2"></span></span>理<span class="_ _2"></span><span class="ff4">器<span class="_ _2"></span>送<span class="_ _2"></span></span>过<span class="_ _2"></span>来<span class="_ _2"></span>后<span class="_ _2"></span>,<span class="_ _2"></span>检<span class="_ _5"></span>测引<span class="_ _2"></span><span class="ff4">擎<span class="_ _2"></span>依</span></div><div class="t m0 x6 h4 y22 ff1 fs1 fc0 sc1 ls0 ws0">据<span class="ff4">预<span class="_ _2"></span>先设<span class="_ _2"></span></span>置的<span class="_ _2"></span>规则<span class="_ _2"></span>检查<span class="_ _2"></span>数据<span class="_ _2"></span><span class="ff4">包<span class="_ _2"></span></span>,一<span class="_ _2"></span><span class="ff4">旦</span>发<span class="_ _2"></span>现数<span class="_ _2"></span>据<span class="ff4">包<span class="_ _2"></span></span>中的<span class="_ _2"></span>内容<span class="_ _2"></span>和<span class="ff4">某<span class="_ _2"></span>条</span>规<span class="_ _2"></span>则<span class="ff4">相<span class="_ _2"></span>匹</span>配<span class="_ _2"></span>,就<span class="_ _2"></span>通知<span class="_ _2"></span>报警</div><div class="t m0 x6 h4 y23 ff4 fs1 fc0 sc1 ls0 ws0">模块<span class="ff1">。</span></div><div class="t m0 xc h4 y24 ff1 fs1 fc0 sc1 ls0 ws0">报警<span class="_ _2"></span><span class="ff3">/<span class="_ _2"></span></span>日<span class="ff4">志<span class="_ _2"></span>模<span class="_ _2"></span>块</span>。<span class="_ _2"></span>经<span class="_ _2"></span>检测<span class="_ _2"></span>引<span class="_ _2"></span><span class="ff4">擎<span class="_ _2"></span></span>检查<span class="_ _2"></span>后<span class="_ _2"></span>的<span class="_ _3"> </span><span class="ff3">Snort<span class="_"> </span></span>数据<span class="ff4">需<span class="_ _2"></span></span>要<span class="_ _2"></span>以<span class="ff4">某<span class="_ _2"></span></span>种<span class="_ _2"></span>方式<span class="_ _2"></span><span class="ff4">输<span class="_ _2"></span>出</span>。<span class="_ _2"></span>如<span class="_ _2"></span><span class="ff4">果<span class="_ _2"></span></span>检测<span class="_ _2"></span>引<span class="_ _2"></span><span class="ff4">擎</span></div><div class="t m0 x6 h4 y25 ff1 fs1 fc0 sc1 ls0 ws0">中的<span class="ff4">某条</span>规则被<span class="ff4">匹</span>配,则会<span class="ff4">触</span>发一<span class="ff4">条</span>报警。</div><div class="t m0 xc h4 y3e ff3 fs1 fc0 sc1 ls0 ws0">3<span class="ff1">)</span>Snort<span class="_ _1"> </span><span class="ff1">规则</span></div><div class="t m0 xc h4 y3f ff3 fs1 fc0 sc1 ls0 ws0">Snort<span class="_ _1"> </span><span class="ff1">的<span class="ff4">每条<span class="_ _2"></span></span>规则<span class="ff4">逻辑</span>上<span class="ff4">都<span class="_ _2"></span></span>可以分成规则<span class="_ _2"></span><span class="ff4">头</span>部和规则<span class="ff4">选<span class="_ _2"></span>项</span>。规则<span class="ff4">头</span>部<span class="_ _2"></span><span class="ff4">包括</span>规则行为<span class="_ _2"></span>、<span class="ff4">协</span></span></div><div class="t m0 x6 h4 y40 ff4 fs1 fc0 sc1 ls0 ws0">议<span class="ff1">、源或</span>目<span class="_ _2"></span><span class="ff1">的<span class="_ _1"> </span><span class="ff3">IP<span class="_ _1"> </span></span>地<span class="_ _2"></span></span>址<span class="ff1">、</span>子<span class="ff1">网</span>掩码<span class="_ _2"></span><span class="ff1">、源</span>端口<span class="ff1">和</span>目<span class="_ _2"></span><span class="ff1">的</span>端口<span class="ff1">;规则<span class="_ _2"></span></span>选项包含<span class="ff1">报警<span class="_ _2"></span>信息和异常</span>包<span class="_ _2"></span><span class="ff1">的</span></div><div class="t m0 x6 h4 y28 ff1 fs1 fc0 sc1 ls0 ws0">信息<span class="_ _2"></span>(特<span class="_ _2"></span><span class="ff4">征码<span class="_ _2"></span></span>),<span class="_ _2"></span>基于<span class="_ _2"></span>特<span class="_ _2"></span><span class="ff4">征码<span class="_ _2"></span>决定<span class="_ _2"></span></span>是否<span class="_ _2"></span><span class="ff4">采取<span class="_ _2"></span></span>规则<span class="_ _2"></span>规<span class="ff4">定<span class="_ _2"></span></span>的行<span class="_ _2"></span>动。<span class="_ _2"></span>对于<span class="_ _2"></span><span class="ff4">每条<span class="_ _2"></span></span>规则<span class="_ _2"></span>来<span class="ff4">说<span class="_ _2"></span></span>,规<span class="_ _2"></span>则<span class="ff4">选</span></div><div class="t m0 xd h8 y29 ff3 fs4 fc0 sc1 ls0 ws0">3</div></div></div><div class="pi" data-data='{"ctm":[1.611850,0.000000,0.000000,1.611850,0.000000,0.000000]}'></div></div>