Skip Nav Destination
ASME Press Select Proceedings
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)Available to Purchase
Editor
V. E. Muhin,
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
139 The Research and Design of Intrusion Detection System in IPV6 Network Available to Purchase
By
Lan Shi
,
Lan Shi
Computer Architecture,
Information science and engineering college of NEU
, Shenyang
, China
; [email protected]
Search for other works by this author on:
Yu Zhou
,
Yu Zhou
Computer Software and Theory,
Information science and engineering college of NEU
, Shenyang
, China
; [email protected]
Search for other works by this author on:
Jing Li
,
Jing Li
Computer Software and Theory,
Information science and engineering college of NEU
, Shenyang
, China
; [email protected]
Search for other works by this author on:
Jingxuan Lin
Jingxuan Lin
Computer Architecture,
Information science and engineering college of NEU
, Shenyang
, China
; [email protected]
Search for other works by this author on:
Page Count:
4
-
Published:2011
Citation
Shi, L, Zhou, Y, Li, J, & Lin, J. "The Research and Design of Intrusion Detection System in IPV6 Network." International Conference on Information Technology and Computer Science, 3rd (ITCS 2011). Ed. Muhin, VE, & Hu, WB. ASME Press, 2011.
Download citation file:
Intrusion detection technology, which is a method of covering the shortage of firewall, is developing more and more mature. But now, Internet is extremely inflating, construction of IPv6 network has achieved great success. Attacks which are inevitable in Ipv6 network, they show some new characteristics. So, need to design a new IDS which work in Ipv6 network. Authors used the old IDS that work in IPv4 network as the foundation, changed each modules to capture and process Ipv6 data packets, modified those rules in Snort rule library to identify the attacks in IPv6 network, implemented a IDS that could work in Ipv6 network.
Abstract
Keywords
I. Introduction
II. System Model and Related Technical Research
III. System Implementation
IV. System Test
V. Summarizes
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
High Perfermance Snort Architecture Design Based on Network Application Processor
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
Design and Implementation of an Anomaly-Based Intrusion Detection System for Wireless Industrial Networks
International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012)
Application of Fuzzy Clustering Algorithm in Intrusion Detection System
International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011)
Related Articles
Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions
J. Comput. Inf. Sci. Eng (February,2020)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
Creative Contributions of the Methods of Inventive Principles of TRIZ and BioTRIZ to Problem Solving
J. Mech. Des (August,2017)