بررسي روشهاي تشخيص نفوذ در شبکه هاي کامپيوتري (IDS)

بررسي روشهاي تشخيص نفوذ در شبکه هاي کامپيوتري (IDS)

بررسي-روشهاي-تشخيص-نفوذ-در-شبکه-هاي-کامپيوتري-	(ids)  1122345689991111111213فهرست مطالبفصل اول بررسی اجمالی تشخیص نفوذ / پیشگیری  1-1مقدمه                                                                                                                        2-1تعریف                                                                                                                        3-1 فن آوری                                                                                                                    1-3-1 NIDS                                                                                                          2-3-1 wireless                                                                                                              3-3-1 DIDS                                                                                                                  4-3-1 NBAD                                                                                                                  5-3-1 HIDS                                                                                                                    1-4-1 رو­شهاي برخورد و پاسخ به نفوذ                                                                                    5-1 روشهای تشخیص                                                                                            1-5-1 روشهای تشخیص براساس امضاء                                                                                  2-5-1 روشهای تشخیص براساس ناهنجاری                                                                              3-5-1 پروتوکل بررسی stateful                                                                                            6-1 مولفه­های سیستم                                                                                                        1-6-1 حسگرها                                                                                                                 2-6-1 Analyzers                                                                                                         3-6-1 Honeypot                                                                                                           فصل دوم    فن آوری15151617181820213841­­­­­­­51515151525254 1-2 NIDS                                                                                                                      1-1-2 بررسی مدل OSI                                                                                                     2-1-2 انواع مولفه ها                                                                                                          3-1-2 محل سنسورهای NIDS                                                                                            4-1-2 انواع رویدادها                                                                                                          5-1-2 توانایی امنیتی                                                                                                         2-2 Wireless                                                                                                              3-2 نصب و پيكربندي سيستم تشخيص نفوذ Snort                                                                  4-2 NBAD                                                                                                                  5-2 HIDS                                                                                                                    فصل سوم مدیریت IDS1-3 پیشگیری                                                                                                                 2-3 نگهداری                                                                                                                  3-3 میزان سازی                                                                                                                                                            4-3 دقت تشخیص                                                                                               5-3 چالش هایIDS                                                                                                         6-3 چالش ها درIDS                                                                                                                                                                                                                              7-3 روش هاي دور زدن سيستم هاي تشخيص نفوذ   IDS                                                                 54 5556578-3 انتخاب محصولات IDS          فصل چهارم                                                                                        نتیجه­گیری                                                                                                                                                                                                                                          پیشنهادهامنابع و مأخذ                                                                                                                       چکیده:

دانلود فایل

دانلود فایل بررسي روشهاي تشخيص نفوذ در شبکه هاي کامپيوتري (IDS)

تشخیص نفوذ,NIDS ,NBAD ,تشخیص براساس امضاء ,حسگر,پيكربندي ,سيستم Snort ,تشخیص براساس ناهنجاری,,,