[1]陈建锐 何增颖 梁永成.IPv6网络入侵检测系统设计[J].计算机技术与发展,2010,(09):123-126.
 CHEN Jian-rui,HE Zeng-ying,LIANG Yong-cheng.Design of Network Intrusion Detection System on IPv6[J].,2010,(09):123-126.
点击复制

IPv6网络入侵检测系统设计()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年09期
页码:
123-126
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Design of Network Intrusion Detection System on IPv6
文章编号:
1673-629X(2010)09-0123-04
作者:
陈建锐 何增颖 梁永成
湛江师范学院
Author(s):
CHEN Jian-ruiHE Zeng-yingLIANG Yong-cheng
Zhanjiang Normal College
关键词:
IPv6入侵检测网络安全
Keywords:
IPv6 intrusion detection network security
分类号:
TP393
文献标志码:
A
摘要:
下一代因特网IPv6正在逐步普及,与之相关的安全问题也引起了人们的关注,网络入侵检测系统是实现主动防御的关键技术。首先,在IPv6特性分析和形式化描述的基础上,阐述了基于IPv6的网络入侵检测系统的层次框架。然后,研究系统的工作流程和主要技术的特点,确立采用分层的设计思想,结合IPv6的特性从系统架构各模块进行分析研究。设计了一种可以很好地应用于IPv6环境中的网络入侵检测系统。提出的系统实现方案能达到很好的安全效果
Abstract:
Next generation internet IPv6 is gradually being spread,the associated security issues also attracted attention,network intrusion detection system is to achieve active defense of the key technologies.First,based on the IPv6 feature analysis and formal description,describe IPv6-based network intrusion detection system-level framework.Then,research system's work processes and the main technical characteristics,established using hierarchical design idea,combining the characteristics of IPv6 various modules from the system architecture analysis and study.On this basis,the network intrusion detection system is designed which can be well applied in an IPv6 environment.The proposed system implementation program to achieve excellent safety results

相似文献/References:

[1]罗辉琼 聂瑞华 郑凯.基于IPv6的校园网升级研究[J].计算机技术与发展,2010,(03):132.
 LUO Hui-qiong,NIE Rui-hua,ZHENG Kai.Research on Campus Network Upgrade Based on IPv6[J].,2010,(09):132.
[2]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(09):143.
[3]闫文耀 王志晓 白海涛 陈海荣[].IPv6组播的轻量级视频会议系统设计与实现[J].计算机技术与发展,2010,(03):184.
 YAN Wen-yao,WANG Zhi-xiao,BAI Hai-tao,et al.Design and Implementation of Light- Power Video Conference System Based on IPv6 Multicast[J].,2010,(09):184.
[4]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(09):151.
[5]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(09):148.
[6]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(09):254.
[7]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(09):162.
[8]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(09):170.
[9]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(09):168.
[10]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(09):179.

备注/Memo

备注/Memo:
湛江市科技攻关计划项目(湛科[2009]64号); 湛江师范学院自然科学项目(L0823)陈建锐(1981-),男,广东湛江人,硕士,实验师。研究方向为计算机与网络应用、实验教学与管理
更新日期/Last Update: 1900-01-01