透過您的圖書館登入
IP:3.147.83.242
  • 學位論文

以Snort偵測並封鎖網路異常行為之研究

A Study on detecting abnormal network behaviors using Snort

指導教授 : 蔡文能

摘要


網路的發展越興盛,政府或企業利用網路來提供服務的頻率也越來越高。各項資料的E化雖帶來了不少便利,但也伴隨著各種危機。如駭客的入侵,導致學生資料外洩或成績遭到竄改等。 大部分的校園網路,通常以防火牆作為防止駭客入侵的第一道防線,但隨著網路技術的發展,駭客的攻擊方式與手法也越來越成熟且多樣化。面對層出不窮且變化多端的網路入侵攻擊,單靠防火牆的防禦是不夠的。因此,本研究以入侵偵測系統Snort及防火牆Iptables為基礎,搭配PHP開發出ABBA System,協助網路管理人員有效的從眾多的警示訊息中分析出可疑的入侵行為,並透過防火牆加以封鎖。 本研究以實際在國小電腦教室所蒐集到的警示警訊,利用ABBA System 進行統計分析,經由分析的結果,確實可以協助網路管理人員瞭解目前網路的異常狀況,藉此擬定因應的措施,以達到提升校園網路安全的目的。

並列摘要


The more prosperous development of the Internet, the higher frequency both the Government and enterprises use it to provide services. The electronization of different kinds of data in various applications has brought much convenience. However, the easy access of the Internet were accompanied with many risks, such as information leakage, system intrusion , etc. Most of the campus networks use firewall to prevent hackers as the first line of defense. Since the approaches used by hackers have become more sophisticated and diversified with the great development of the Internet. Using firewall as the only defensive tool is not enough. Therefore, this study proposed a solid IPS and ABBA System, which utilized the network system administrator to detect suspicious intrusion effectively among abounding alerts, and furthermore blocked it by firewall. In this study, we collected the data of invasion from the computers in computer classrooms in an elementary school. Then we employed the ABBA System to carry out statistical analysis. The result we obtained from the ABBA System did benefit the system administrators realize the present status of network anomalies and allowed them to take necessary actions ,which contributed to achieve the goal of upgrading the safety of campus .

參考文獻


[12] 蕭漢威、楊錦生、魏志平、馬淑貞。以網路流量資料探勘進行阻斷服務攻擊偵測之研究。資訊管理學報,第十四卷,第二期,5。
[7] 李為漢(2005)。網際網路惡意程式之活動調查—以某企業對外網路連線為例。國立中央大學資訊管理研究所碩士論文,未出版,桃園縣。
[1] Jay Beale,James C.Foster,Jeffrey Posluns,Ryna Russell,and Brian Caswell. Snort 2.0 Intrusion Detection. Syngress,2003。
[2] 沈文吉(2001)。網路安全監控與攻擊行為之分析與實作。國立台灣大學資訊管理研究所碩士論文,未出版,台北市。
[3] 莊振宏(2003)。針對網路銀行之異常偵測模組研究。長庚大學資訊管理研究所碩士論文,未出版,桃園縣。

被引用紀錄


李長霖(2011)。植基於虛擬化技術之網路安全縱深防禦架構〔碩士論文,國立交通大學〕。華藝線上圖書館。https://doi.org/10.6842/NCTU.2011.00097
陳泓哲(2014)。資訊安全的自建與委外分析〔碩士論文,國立清華大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0016-2912201413544218

延伸閱讀