Computer and Modernization

Previous Articles     Next Articles

Intrusion Detection System Based on Integration of #br# Various Detection Technologies

  

  1. 1. Beijing GuoDianTong Network Technology Co. Ltd.〖KG-*3〗, Beijing 100070, China;
    2. School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;
    3. Key Lab of Shanghai Information Security Integrated Management Research, Shanghai 200240, China;
    4. Information and Telecommunication Branch of State Grid Zhejiang Electric Power Company, Hangzhou 310007, China
  • Received:2015-11-03 Online:2016-05-24 Published:2016-05-25

Abstract:

With the continuous development of network technology, inhouse network security is also increasingly subject to various known and unknown malware threats. In order
to detect these malicious programs, we designed and implemented an intrusion detection system based on integration of the depth detection technology, anomaly detection
technology, misuse detection technology. This intrusion detection system uses depth protocol analysis, behavioral analysis, feature matching, intelligent protocol
identification, protocol anomaly attack detection, traffic anomaly detection and so on. And this intrusion detection system realizes malicious programs detection through data
acquisition module, data reorganization module, data analysis module, console module and features for system management module. The system overcomes the shortcomings of
traditional single detection schemes, and can detect new generation of threats such as 0day attacks, polymorphic attacks, distortion attacks effectively.

Key words: depth detection, intrusion detection, misuse detection, protocol analysis

CLC Number: