基于Linux的计算机网络服务器入侵与防御技术探讨

Lien-Yuan Ting
{"title":"基于Linux的计算机网络服务器入侵与防御技术探讨","authors":"Lien-Yuan Ting","doi":"10.1109/ICSMDI57622.2023.00040","DOIUrl":null,"url":null,"abstract":"One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Discussion on Intrusion and Defense Technology of Computer Network Server with Linux\",\"authors\":\"Lien-Yuan Ting\",\"doi\":\"10.1109/ICSMDI57622.2023.00040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

主动防御思想中最重要的内容之一就是数据采集和数据分析,特别是在很多情况下主要采用抓包技术对网络中的原始数据包进行分析。在网络安全分析系统中,原始数据的存储变得至关重要。大数据技术可以针对不同的数据类型收集不同的数据,并且可以主动使用不同的方法来提高数据查询的效率。通过新颖的设计,采用可扩展性好、可移植性好、开源的Snort作为系统检测模块,以二级链表的形式组织规则库。最后进行了性能测试和仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Discussion on Intrusion and Defense Technology of Computer Network Server with Linux
One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信