Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (5): 141-143.

• Security Technology • Previous Articles     Next Articles

NIDS Signatures Acquisition and Test Data Generation

WANG Ying1,2, TAN Jianlong1, SHEN Xingxing1,2, LIU Ping1   

  1. 1. Software Lab, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080;2. Graduate School, Chinese Academy of Sciences, Beijing 100039
  • Online:2006-03-05 Published:2006-03-05

NIDS 签名获取及其测试数据的生成

王 映 1,2,谭建龙1,沈星星1,2,刘萍 1   

  1. 1. 中国科学院计算技术研究所软件研究室,北京 100080;2. 中国科学院研究生院,北京 100039

Abstract: It’s hard to acquire a practical signature library and its test data when user implements a new intrusion detecting algorithm. This paper introduces how to exploit SnortTM’s signature library and how to generate corresponding test data. It also gives some experiment results.

Key words: NIDS signature; Test data generation; Snort

摘要: 当实现一个新的NIDS 检测算法时,很难获得一个实用的签名库及其测试数据。该文介绍了怎样利用Snort 的签名库,以及怎样生成相应的测试数据,最后给出了一些测试数据。

关键词: NIDS 签名;测试数据生成;Snort