Dissertation > Excellent graduate degree dissertation topics show

Intrusion detection based on data mining unknown attack recognition framework

Author: YaoXing
Tutor: FengYan
School: Zhejiang University
Course: Applied Computer Technology
Keywords: Intrusion Detection Date Mining Multi-Attack-Detection Clustering Association method
CLC: TP393.08
Type: Master's thesis
Year: 2006
Downloads: 156
Quote: 3
Read: Download Dissertation

Abstract


Along with the fast development of the network technology and the complication of the internet environment, the network security problem is getting more and more serious. As a new computer security technique, Intrusion Detection System(IDS) has been used more and more widely, and become an important part of Deep-Defense computer security system. IDS can discover all kinds of hostile data both on internet and on computer, and take action to eliminate them. It can detect intrusions from extranet hackers and the attack form inside.Data Mining is a useful tool to analyze magnanimous data and to explore hidden rules, so it is widely used in different domains. In the situation of new attack methods occurred continually, especially some cooperated intrusions, IDS’s strategy of detect known attack with rules show its limitation. IDS needs Data Mining to dig out new form of new attack.In this paper, we develop a framework which can explore new attack data to update IDS. It first filtrate the new attack records unknown for IDS, then analyze them to extract description. In the implement, we use Association to analyse and shear dataset, use Clustering to explore new attackings. In the rule-extract process, we discuss several algorithms, including Decision Tree, Frequent-AttributeSet and Hierarchical-Clustering, and choose the proper ones to improve.Lots of delicate amelioration, especially the method of Dynamic-Program, make all algorithms cooperate well and make the framework work with higher efficiency. This Framework can get exact rules when multi-attacks arrive simultaneity.

Related Dissertations

  1. Research and Implementation of Mining Implicit User Interest,TP311.13
  2. Establishment and Update of Similar Users’ Cluster in Personalized Information Retrieval,TP391.3
  3. Research on Removal Algorithm of Shadows in Image Segmentation,TP391.41
  4. The Research of the Text Extraction Method Based on Spectral Cut,TP391.41
  5. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  6. Research and Improvement on K-Means Clustering Algorithm,TP311.13
  7. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  8. Research of Scheduling Algorithm Based on Hybrid Adaptive Genetic Algorithm in Computing Grid,TP393.09
  9. Evaluation of Photosynthetic Efficiancy of Seedlings of the Hybrid Progenies (F1) in Peach,S662.1
  10. The Load Research and Comprehensive Evaluation on the Agricultural Non-Point Source Pollution in Nantong,X592
  11. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  12. BF-FCM Clustering Algorithm and Its Application in the Image Segmentation,TP391.41
  13. The Application of Ant Colony Algorithm in Meteorological Satellite Cloud Pictures Segmentation,TP391.41
  14. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  15. Research on K-means Optimization Clustering Algorithm,TP311.13
  16. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  17. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  18. Study on Photosynthetic Characteristics of Peach Based on Heterosis of Assimilation Capacity,S662.1
  19. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  20. The Research on Routing Protocol of Agricultural Environmental Monitoring System Based on Wir Eless Sensor Networks,TN915.04
  21. Finding Web Services Based on Clustering Probabilistic Semantic Approach,TP393.09

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile