Dissertation > Excellent graduate degree dissertation topics show

Research and Application of DIDS control center technology

Author: XiongXinQuan
Tutor: TanTongDe;DiGuangQun
School: Zhengzhou University
Course: Applied Computer Technology
Keywords: Intrusion Detection Information Fusion Information Filtering Information associated Intrusion Response
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 33
Quote: 1
Read: Download Dissertation


As the Internet increasingly open, as well as the rapid development of network technology, accompanied by network attacks are getting more and more serious, the issue of network security has become a very hot topic, attention is gradually being. The traditional static security defense system, such as firewalls, authentication and data encryption technologies are relatively mature, there are some defects, however, still can not completely solve the current network security situation. So, intrusion detection (IDS) technology came into being. Intrusions can found traces of the intrusion and the law, to make up for the deficiencies of the traditional security technologies, is a dynamic network security system, a firewall after a security perimeter. The face of an increasingly complex and large network environments, distributed intrusion detection technology to become one of the current intrusion detection technology trends. This article from the overall design of a distributed intrusion detection system, a detailed analysis and discussion, and focus on the achievement of the Distributed Intrusion Detection System Control Center features, including user interface design, user management, detectors management log management, intrusion response. Distributed Intrusion Detection System, the huge number of alarm information systems analysts face of such data is often impossible to start. IDS is generally only concerned with low-level attacks and anomalies, and each produces its own alarm information, lack of coordination specification to each other, can not capture the logical steps to hide behind these attacks and strategy. In view of this situation, this article has designed an information fusion model filter processing repeat the alarm information, alarm information merge processing through experiments that the information fusion technology can effectively streamline the alarm information to reduce information redundancy , which can be brought to the administrator. In addition, with the development of intrusion detection technology, a growing number of IDS adopted a proactive approach to resist attacks such as discarded suspicious data packets isolated node of attacks, reconfigure the network environment. In this paper, on the basis of existing active response technology, combined with the response to the invasion of the cost analysis and response strategy selection, design an intrusion response decision-making model and operational decision-making based on quantitative criteria, the model for intrusion response steps and methods.

Related Dissertations

  1. Tongue Feature Extraction and Research of Fusion Classification,TP391.41
  2. Multi-Sensor Information Fusion and Its Applications on Wearable Computer,TP202
  3. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  4. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  5. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  6. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  7. Study on the Technique of Information Fusionapplied to Enbedded Driver Fatigue Detection,TP368.12
  8. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  9. An Intrusion Detection System for High-Speed Networks,TP393.08
  10. Research on the Security in Wireless Sensor Network,TN915.08
  11. Research and Implementation of the Key Technologies for Multimeida Sensor Terminal,TP212.9
  12. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  13. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  14. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  15. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  16. Information Fusion Based on Multi- wheeled mobile robot navigation technology,TP242
  17. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  18. Intrusion detection based on data mining technology research,TP393.08
  19. Based on a combination of multi-sensor automated guided vehicle systems research and application,TP242.2
  20. Design and implementation of intrusion detection system based on association rules,TP393.08
  21. Study on intrusion detection method of ultrasonic echo envelope characteristics,TP274.53

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile