Bing-Yan Zhang, C. Wei, Xing-Hai Yang, Bei-Bei Song
{"title":"设计并实现了一个基于网络的入侵检测系统","authors":"Bing-Yan Zhang, C. Wei, Xing-Hai Yang, Bei-Bei Song","doi":"10.1109/SPAC46244.2018.8965538","DOIUrl":null,"url":null,"abstract":"Intrusion detection is a very important network security technology in the field of network security. Capable of real-time and dynamic monitoring of the network. In this paper, the intrusion detection technology and snort tools on the basis of the detailed instructions, designs and realizes a to snort under Linux operating system as the core component of intrusion detection system, and visualization of the result can be displayed on the Web.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Design and implementation of a network based intrusion detection systems\",\"authors\":\"Bing-Yan Zhang, C. Wei, Xing-Hai Yang, Bei-Bei Song\",\"doi\":\"10.1109/SPAC46244.2018.8965538\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection is a very important network security technology in the field of network security. Capable of real-time and dynamic monitoring of the network. In this paper, the intrusion detection technology and snort tools on the basis of the detailed instructions, designs and realizes a to snort under Linux operating system as the core component of intrusion detection system, and visualization of the result can be displayed on the Web.\",\"PeriodicalId\":360369,\"journal\":{\"name\":\"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPAC46244.2018.8965538\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPAC46244.2018.8965538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and implementation of a network based intrusion detection systems
Intrusion detection is a very important network security technology in the field of network security. Capable of real-time and dynamic monitoring of the network. In this paper, the intrusion detection technology and snort tools on the basis of the detailed instructions, designs and realizes a to snort under Linux operating system as the core component of intrusion detection system, and visualization of the result can be displayed on the Web.