下載電子全文宣告This thesis is authorized to indicate in-campus access only
You can not download at the moment.
Your IP address is 184.108.40.206
The defense date of the thesis is 2004-01-18
The current date is 2018-06-21
This thesis will be accessible at off-campus not accessible
URN etd-0118104-155807 Statistics This thesis had been viewed 2181 times. Download 40 times. Author Po-Wei Wang Author's Email Address No Public. Department Computer Science and Enginerring Year 2003 Semester 1 Degree Master Type of Document Master's Thesis Language English Page Count 58 Title NetFlow Based Intrusion Detection System Keyword NetFlow Intrusion Detection Intrusion Detection NetFlow Abstract Due to the popularity of Internet, people can access remote resource on the Internet conveniently. But numerous malicious network events such as computer virus and hacker attack make the network management more difficult. A network intrusion detection system is thus more and more demanding.
In this thesis, a NetFlow based anomaly intrusion detection system is presented. In addition, guidelines to properly configure and setup network device to minimize the possibilities that network attacks come from inside are also proposed. As the Internet becomes the platform of daily activities, the threat of network attack is also become more serious. Firewall along is not capable to protect the system from being attacked through normal service channel. Furthermore, most of the current intrusion detection system focus on the border of organization network which does not provide protection to hosts in the local network and the network itself if the attack is from inside. Therefore, in addition to the firewall and border IDS, we need to use other type of intrusion detection system to protect the critical system as well as the network itself.We propose an inexpensive and easy to implement way to perform the anomaly type intrusion detection based on the NetFlow information exported from the routers or other network probes. Our system can detect several types of network attack from inside or outside and perform counter maneuver accordingly.
Advisor Committee Tsang-Long Pao - advisor
none - co-chair
none - co-chair
Files Date of Defense 2004-01-12 Date of Submission 2004-01-18