期刊文献+

基于多层模式匹配技术的高速以太网NIDS实现方案 被引量:1

Implementation of Network- based Intrusion Detection System for Fast-speed Ethernet Based on the Multi-layer Pattern Matching Method
下载PDF
导出
摘要 目前多数基于网络的入侵检测系统(NIDS)无法适用于对高速以太网链路的实时流量分析和入侵检测任务。本文在传统模式匹配方法的基础上,引入了基于协议分析的多层模式匹配概念:采用FPGA硬件逻辑对长度和偏移量相对固定的数据包包首部分进行模式匹配;采用核心态软件逻辑对长度和偏移量变化的数据包负载部分进行模式匹配。新的模式匹配技术有效提高了NIDS的整体性能。最后,本文给出了一种基于多层模式匹配的高速以太网NIDS实现方案,并对FPGA硬件逻辑和核心态软件逻辑采用的检测策略进行了详细说明。 As a response to increased threats, many Network-based Intrusion Detection Systems (NIDSs) have been developed, but current NIDS are barely capable of real-time tragic analysis and intrusion detection job on Fast Ethernet links. This paper describes a new matching method with the name “Multi-layer Pattern Matching (MPM)” based on the protocol analysis. MPM is a pattern matching method using the FPGA logic and kernel logic as the detection mechanism. FPGA logic performs the function of fixed field pattern matching based on packet header information that is easily examined by fixed size and offset. Kernel logic performs the function of payload pattern matching based on packet payload information that is not easily examined by variable size and offset. This new matching method can improve the performance of the NIDSs. A new implementation of NIDS for fast-speed Ethernet based on the MPM method is proposed finally, and the detection strategies applied FPGA logic and kernel logic are described in detail.
作者 余扬 孔梦荣
出处 《微电子学与计算机》 CSCD 北大核心 2005年第9期30-34,共5页 Microelectronics & Computer
关键词 高速以太网 入侵检测系统 FPGA逻辑 核心态逻辑 Fast-speed Ethernet, Intrusion Detection System (IDS), FPGA logic, Kernel logic
  • 相关文献

参考文献6

  • 1喻飞,朱妙松,朱淼良,安吉尧,陈兵华,刘晖.入侵检测系统中特征匹配的改进[J].计算机工程与应用,2003,39(29):32-34. 被引量:8
  • 2薛英花,吕述望,苏桂平,杨柱.入侵检测系统研究[J].计算机工程与应用,2003,39(1):150-152. 被引量:23
  • 3M Roesch. Snort-Lightwight Intrusion Detec-tion for Networks. In Proceedings of the USENIX LISA'99 Conference,November, 1999.
  • 4Marcus Ranum, Burglar Alarms for Detecting Intrusions.NFR Inc. 1999.
  • 5Thomas Ptacek and Timothy Newsham, Insertion, Evasion,and Denial of Service: Eluding Network Intru- sion Detection. Secure Networks Inc., 1998.
  • 6WRichardStevens著 范建华译.TCP/IP详解2:协议[M].北京:机械工业出版社,2000(4)..

二级参考文献24

  • 1喻飞 李仁发 杨超群 等.一种基于贝叶斯算法的电子邮件过滤网关模型.小型微型计算机系统,2003,(4).
  • 2Wrichard Stevens著 范建华等译.TCP/IP详解2:协议[M].北京:机械工业出版社,2000 (4)..
  • 3[1]Julia Allen,Alan Christie,William Fithen et al. State of the Practice of Intrusion Detection Technologies.2000
  • 4[2]An Introduction to Intrusion Detection& Assessment[M].ICSA,Inc
  • 5[3]Network Based Intrusion Detection-A review of technologies[M].DENMAC SYSTEMS ,INC, 1999
  • 6[4]Clifford Kahn,Phillip A Porras,Stuart Staniford Chen et al.A Common Intrusion Detection Framework.1998
  • 7[5]W Richard Stevens. UNIX network programming[S].ISBN 7-302-02942-3
  • 8[6]Eric Harlow. Developing linux application with GTK+ and GDK[S].ISBN 7-5053-5680-1
  • 9T Tidwell,R Larson,K Fitch et al.Modeling Internet Attacks[C].In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001:54-59.
  • 10Andrew P Moore,Robert J Ellison,Rechard C Linger.Attack Modeling for Information Security and Survivability.Technical Notes,Carnegie Mellon University,2001-03.

共引文献28

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部