A distributed intrusion detection prototype system is realized , and a detection and response approach of this system for distributed denial of service is provided 实现了一个分布式入侵检测的原型系统,并针对分布式拒绝服务攻击,给出该系统的检测和响应方法。
Distributed denial of service attack ( ddos ) is one of the dangers intrusion , the intrusion hide themselves through all kinds of ways , trace back is one of major hotspot of net security science 摘要分布式拒绝服务攻击通过控制多台傀儡机对目标机进行攻击,该类型攻击的攻击路径隐蔽,对攻击者跟踪困难。
Hackers then initiated a so - called distributed denial of service , in which attackers take command of third - party computers , through a virus or other security vulnerability , and instruct them to send junk data to the target site , overwhelming servers and causing the site to crash or perform poorly 随即,黑客们就采取了所谓"分布式拒绝"的攻击,该攻击利用病毒或其它安全缺陷控制傀儡机,并指引傀儡机向攻击目标发送垃圾数据包,以击垮导致网站瘫痪或运行不畅。
Ids has been fast developing since it ' s put forward . but intrusion detection technology is now wandering with the universal application of high - speed network , the appear of new attack methods like distributed denial of service attack , and the low efficiency and high false positive of today ' s idss 但是,由于高速网络和交换式网络的普遍应用,以分布式拒绝服务攻击为代表的新型攻击方式的出现和发展,以及现有入侵检测系统效率低下、误报率和漏报率较高的问题无法得到有效解决等问题,目前入侵检测技术正处于发展的关键时期。
Network attacks damaged networks and users , among which dos ( denial of service ) attacks become one of the common network attack techniques by the characteristics , such as extensive area , strong concealment , simpleness and efficiency , etc . dos attacks greatly affected the effective service of network and host systems , especially among which , ddos ( distributed denial of service ) attacks are greatly threatening internet , since they are difficult to recognize and defense due to their concealment and distribution 随着互联网的迅速普及和应用的不断发展,各种黑客工具和网络攻击手段也随之倍出,网络攻击导致网络和用户受到侵害,其中拒绝服务( dos , denialofservice )攻击以其攻击范围广、隐蔽性强、简单有效等特点成为常见的网络攻击技术之一,极大地影响网络和业务主机系统的有效服务。其中,尤其是分布式拒绝服务( ddos , distributeddenialofservice )攻击,由于其隐蔽性和分布性很难被识别和防御严重威胁着internet 。
Hackers then initiated a so - called distributed denial of service , in which attackers take command of third - party computers , through a virus or other security vulnerability , and instruct them to send junk data to the target site , overwhelming servers and causing the site to crash or perform poorly 随即,黑客们就采取了所谓"分布式拒绝服务"的攻击,该攻击利用病毒或其它安全缺陷控制傀儡机,并指引傀儡机向攻击目标发送垃圾数据包,以击垮服务器,导致网站瘫痪或运行不畅。
Two main methods are as follows : ( 1 ) using identity theft techniques like phasing to order expensive goods and bill them to some innocent person , then liquidating the goods for quick cash ; ( 2 ) extortion by using a network of compromised " zombie " computers to engage in distributed denial of service attacks against the target web site until it starts paying protection money 二个主要方法是如下: ( 1 )使用本身偷窃技术,喜欢分阶段定购昂贵的物品,然后把账单弄到那些无辜的人身上,最后物品清算为现金; ( 2 )敲诈,通过使用妥协的"蛇神"计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
The application may be a . helpful and innovational experiment . to each module and technology in the honeynet , for instance , data controlling , data analysis , data capture , virtual machine , intr is ion detection technique and secure communication technology , carry on detailed research and realize , provide intrision decetion source code . through this research about honeynet application in distributed denial of service , it have stated strong vitality on solve the new and old problem existing in network security 研究了将人工智能思想引入到蜜网中的可行性?对人工神经网络中的经典算法bp算法在蜜网数据检测和分析中的实际应用进行了详细的剖析,进行了实现;可以认为是将人工智能思想引入到蜜网中的一次有益的和创新的尝试;对蜜网中的各个模块和技术,如数据控制、数据分析、数据捕获、虚拟机、入侵检测技术和安全通信openssh技术等,进行了详细的研究和实现,给出了入侵检测部分功能的源码。