18.02.2015 Views

目錄 - 研究發展處 - 稻江科技暨管理學院

目錄 - 研究發展處 - 稻江科技暨管理學院

目錄 - 研究發展處 - 稻江科技暨管理學院

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

稻 江 學 報 第 五 卷 第 一 期<br />

Detect Intrusion Systems –Implementation of Snort Platform<br />

Mi-Cheng Lu<br />

Department of Information Management, National Chung Cheng University, 168, University Rd., Min-Hsiung,<br />

Chia-Yi, Taiwan, R.O.C.<br />

Abstract<br />

As a result of business becoming electronic, data becoming digital, and network becoming highly developed in<br />

recent years, security problems of network has becoming more and more serious. How to effectively protect a<br />

network so that important informations are not to be stolen or destroyed are becoming a very important subject.<br />

The threats on and to network are rapidly. If a malicious invasion is not preventable, it must be detected<br />

immediately. But if rule of a protection system is kept unchanged, there could easily be invasions of new type hostile<br />

program. Therefore, in this research, Snort is used to create a flexible database for developing Intrusion Detection<br />

Systems (IDS) that can keep packages under surveillance, obtain the new characteristic of the hostile program, and<br />

modify the rule for the detective protection system to secure the security of the network.<br />

Keyword: Network Security, Intrusion Detection Systems.<br />

131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!