NFR을 이용한 네트워크 침입 탐지

A Detection Method for Network Intrusion using the NFR

  • 최선철 (동산 여자 전산 고등학교) ;
  • 차현철 (동양대학교 컴퓨터 공학부)
  • 발행 : 2001.05.01

초록

In this paper, we have illustrated implementations and there results of network attacks and detections. We consider two attacks, smurf attach and network mapping attack, which are one of the typical intrusions using the ICMP The NFR/sup TM/ is used to capture all of our interesting packets within the network traffic. We implement the smurf and network mapping attacks with the UNIX raw socket, and build the NFR's backend for it's detection. The N-Code programming is used to build the backend. The implementing results show the possibility of preventing illegal intruding to network systems.

키워드