首页> 外文会议>International Conference on Signal Processing, Communication and Networking >Implementation Of Application Layer Intrusion Detection System Using Protocol Analysis
【24h】

Implementation Of Application Layer Intrusion Detection System Using Protocol Analysis

机译:应用层入侵检测系统使用协议分析实现

获取原文

摘要

The current security problems in the internet quantify the need for a semantic intrusion detection system engine working in the application level. In the proposed semantic IDS, an object is defined as an occurrence of an elementary pattern represented by a regular expression which may not be malicious. However occurrence of combination of some of these objects may represent a malicious behavior of the user. A rule is defined such that it will be triggered whenever a particular set of objects occurs or whenever a specific sequence of object occurs. The rules and the objects are bonded together in Lex tool and integrated with the IDS engine. Given a set of rules (each dictating a number of constraints that the input data must fulfill to trigger it) the IDS engine will find malicious events using as few redundant comparisons as possible. IDS implementation is done in Linux platform using Lex and Yacc tools. The system was implemented completely in web environment and the results are presented with performance analysis.
机译:Internet中当前的安全问题量化了在应用级别工作的语义入侵检测系统引擎的需求。在所提出的语义ID中,对象被定义为由正则表达式表示的基本模式的发生,这可能不恶意。然而,一些这些对象的组合的发生可以代表用户的恶意行为。定义规则,使得每当发生特定对象或发生特定对象序列时,将触发它。规则和对象在LEX工具中绑定在一起,并与IDS引擎集成在一起。给定一组规则(每个都决定输入数据必须符合触发的许多约束)IDS引擎将使用尽可能少的冗余比较来找到恶意事件。使用LEX和YACC工具在Linux平台中完成了ID实现。该系统在Web环境中完全实现,结果显示了性能分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号