Abstract
Traditional encryption and firewall technology cannot fully meet the needs of information security, intrusion detection technology as a necessary means of security, network security plays in its unique role. Snort as a typical lightweight network intrusion detection system (NIDS) is a free open-source projects, design principles and implementation of Snort study of the characteristics can serve as the development of commercial intrusion detection system the cornerstone of a strong academic significance and higher commercial value. The architecture and workflow of Snort was analyzed and key match algorithm (BM algorithm) was studied. The research result has theoretical and practical significance on improvement and optimization of Snort and other intrusion detection systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Caswell B, Beale J, Foster JC, Posluns J (2004) Snort 2.0 intrusion detection. National Defence Industry Press, Beijing, pp 26–29
Lan J, Wang Y (2008) Snort research and improved BM algorithm. Comput Eng Design 29(9):5–6
Song J (2004) Network intrusion detection. National Defence Industry Press, Beijing, pp 116–117
Boyer RS, Strother J Moore A (1997) Fast string searching algorithm. Commun ACM 20(10):762–772
Li H (2005) Based on Snort system-specific string matching algorithm. Harbin Institute of Technology, Harbin
Yang W, Liu X (2006) An improved BM pattern matching algorithms. Comput Appl (2):156–162
Caswell B, Beale J, Foster JC, Poslum J (2001) Snort2.0 instrusion detection. Syngress Pubishing Inc., Boston, pp 118–122
Lou Z, Zhang T (2007) Snort network intrusion detection and its application. Softw Guide (13):156–161
Hu J, Zuo M (2007) Snort intrusion detection rules based on matching study. Comput Secur 2:073–078
Wu F (2010) Snort intrusion detection system with improved BM algorithm [D], vol 10. Southwest Jiaotong University, Chengdu, pp 042–046
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London Limited
About this paper
Cite this paper
Zhou, Gz., Li, Jy. (2012). Research on Snort Intrusion Detection System and Key Match Algorithm. In: Wang, X., Wang, F., Zhong, S. (eds) Electrical, Information Engineering and Mechatronics 2011. Lecture Notes in Electrical Engineering, vol 138. Springer, London. https://doi.org/10.1007/978-1-4471-2467-2_73
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2467-2_73
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2466-5
Online ISBN: 978-1-4471-2467-2
eBook Packages: EngineeringEngineering (R0)