{"title":"基于Linux的计算机网络服务器入侵与防御技术探讨","authors":"Lien-Yuan Ting","doi":"10.1109/ICSMDI57622.2023.00040","DOIUrl":null,"url":null,"abstract":"One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Discussion on Intrusion and Defense Technology of Computer Network Server with Linux\",\"authors\":\"Lien-Yuan Ting\",\"doi\":\"10.1109/ICSMDI57622.2023.00040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Discussion on Intrusion and Defense Technology of Computer Network Server with Linux
One of the most important elements in the idea of active defense is data collection and data analysis, especially in many cases to analyze the original packets in the network by mainly using the packet capture technology. Therefore, this study discusses about intrusion and defense technology of computer network server with Linux, In the network security analysis system, the storage of original data has become crucial. Big data technology can collect different data for different data types, and can actively use different methods to improve the efficiency of data query. Through the novel design, Snort with good scalability, good portabiIi ty, and open source will be used as the system detection module to organize the rule base in the form of a secondary linked list. Finally, the performance is tested and simulated.