首页 | 本学科首页   官方微博 | 高级检索  
     

Snort规则的分析与实现
引用本文:孙立媛,朱亦宁,孙锐轩. Snort规则的分析与实现[J]. 计算机安全, 2009, 0(9): 45-48
作者姓名:孙立媛  朱亦宁  孙锐轩
作者单位:南京大学,江苏,南京,210093;麒麟远创中国软件有限公司南京分公司,江苏,南京,210093
摘    要:Snort是一个著名的开源入侵检测系统,经过若干年的发展,已经成为一个稳定、高效的入侵检测系统。通过对Snort及其规则的分析,介绍了Snort的规则组织结构及其规则匹配流程,并在此基础上实现了对于规则的更新和添加功能,便于用户灵活定义新的入侵检测规则,提升了Snort系统的可扩展性和防范入侵攻击的能力。

关 键 词:网络安全  入侵检测  规则  Snort

The Analysis and Implement of Snort Rules
Abstract:Snort is a well-known open source intrusion detection system,after several years of development,it has become a stable and efficient IDS.This paper mainly analyzes the basic structure of Snort and its rules,and introduces the organizational structure and rules matching process of Snort.Based on this,the update and addition of new rules are implemented which makes users define their own new intrusion detection rules flexibly.This paper can raise the scalability of Snort system and enhance the ability to protectagainst attacks of network.
Keywords:Snort
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号