{"title":"Research of NIDS in IPV6 Based on Protocol Analysis and Pattern Matching","authors":"Shu-qiang Huang, Huan-ming Zhang, Guo-xiang Yao","doi":"10.1109/WKDD.2009.24","DOIUrl":null,"url":null,"abstract":"Some network intrusion security problems of IPv6 are researched and summarized In this paper. And this paper introduces the model of general IDS and the framework of NIDS of Ipv6. Aiming at the structure characters of IPv6 protocols, a new research method of network intrusion detection system based on protocol analysis and multi-pattern matching is put forward. Protocol analysis technology can find protocol suspicious action quickly, and pattern matching technology can detect deep attack action by character matching. Finally, a detailed designing scheme and testing result are provided.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Knowledge Discovery and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2009.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Some network intrusion security problems of IPv6 are researched and summarized In this paper. And this paper introduces the model of general IDS and the framework of NIDS of Ipv6. Aiming at the structure characters of IPv6 protocols, a new research method of network intrusion detection system based on protocol analysis and multi-pattern matching is put forward. Protocol analysis technology can find protocol suspicious action quickly, and pattern matching technology can detect deep attack action by character matching. Finally, a detailed designing scheme and testing result are provided.