JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE)

• Articles • Previous Articles     Next Articles

Research on IDS-faced general-purpose application-level protocol identification technology

LIU Yuan-xun1, XU Qiu-liang1, YUN Xiao-chun2   

  1. 1. School of Computer Science and Technology, Shandong University, Jinan 250061, China;2. Department of Computer Science and Technology, Harbin Institute of Technology, Harbin 100029, China
  • Received:2006-10-25 Revised:1900-01-01 Online:2007-02-24 Published:2007-02-24
  • Contact: LIU Yuan-xun

Abstract: With the ceaseless developing of the computer network environment and strengthening of network application, it becomes more and more difficult to analyze protocol and detect intrusion. In addition, report mistakes and pretermission happen frequently. The reliability of protocol analysis and intrusion detection can be improved greatly by identifying applicationlevel protocol and analyzing different protocols with different methods before protocol analysis and intrusion detection. A generalpurpose applicationlevel protocol identification technology is proposed and applied to an intrusion detection system, whose usability and reliability are proved by the experimentation.

Key words: intrusion detection, multipattern match , protocol identification

CLC Number: 

  • TP309
[1] XIAO Miaomiao, WEI Benzheng, YIN Yilong. A hybrid intrusion detection system based on BFOA and K-means algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 115-119.
[2] LI Chun-yan, LIU Yi-liang, WANG Liang-min*. Intrusion detection scheme based on traffic scenarios in vehicular adhoc networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(1): 29-34.
[3] WANG Hao, HUA Ji-xue, FAN Xiao-shi. Intrusion detection technology based on twin support vector machine [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(6): 53-56.
[4] XIA Zhan-guo, WAN Ling, CAI Shi-yu, SUN Peng-hui. A semi-supervised clustering algorithm oriented to intrusion detection [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 1-7.
[5] DING Yan, LI Yong-zhong*. Research on intrusion detection algorithm based on PCA and semisupervised clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 41-46.
[6] GAO Xiao-wei,JIANG Xiao-yun . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 107-110 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!