Dissertation > Excellent graduate degree dissertation topics show

Research on Automatic Intrusion Response Decision-making System Based on Clustering

Author: TianJie
Tutor: ZhangRuBo
School: Harbin Engineering University
Course: Applied Computer Technology
Keywords: Network Security Intrusion Response Alarm clustering In response to the consideration In response to the urgency
CLC: TP319
Type: Master's thesis
Year: 2007
Downloads: 112
Quote: 0
Read: Download Dissertation

Abstract


With the continuous development of Internet technology , network intrusion technology continue to progress , and is causing increasing harm . Currently , a lot of safety research institutions and security products company will have its center of gravity shifted to the research and development of intrusion detection . Intrusion response mechanism , however , has always been a difficult issue in the development of intrusion detection , and so far no one product has a practical and efficient response systems . A system intrusion is detected not timely respond to the invasion to take corresponding measures , intrusion detection will lose the value of existence . Detection technology continues to improve , the focus of the research is bound to transfer to the study of the response mechanism up . In this paper, on the basis of the intrusion detection software Snort , an automatic intrusion response decision-making system . Intrusion detection is a big drawback is often produce large amounts of repeat alarm , which will consume a large amount of the response time and system resources . Therefore , the method used is in accordance with the classification criteria of the MIT Lincoln Laboratory intrusion will be the same as or similar to the alarm information clustering, so that not only can effectively reduce the number of repeat alarm information , and can improve the efficiency of the response processing . In addition, we learn from the thinking of the of Wenke Lee cost-sensitive model , to eliminate those is a real invasion , but the target system does not cause harm to the system immune alarm . In this paper, the intrusion response , using the concept of response urgency in the decision - making process , it is subject to the dual constraints from the invasion and the target system , and the severity of the hazard after the occurrence of an event in response to the key decision processing unit factors , but also to develop an important reference for intrusion response strategies . Around the response to the emergency degree , the completion of the implementation of response strategy selection and response behavior by response decision process unit automatically . Finally, through experiments verify the effectiveness of the automatic intrusion response system model has some practical value .

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Region-based wireless sensor network key management scheme for research,TP212.9
  4. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  5. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  6. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  7. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  8. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  9. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  10. Ship mountain of e-government network security solutions outside the network design and implementation,TP393.08
  11. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  12. Firewall and three switch - based campus network security policy research,TP393.08
  13. Research and Design of Secure Comunication of NVD on Demand System,TP309
  14. Optimization and Design of Ningxia Mobile’s Business Supporting Network’s Security System,TN929.5
  15. QH Software Services Marketing Strategy,F426.672
  16. Fast protocol identification based firewall system design and implementation,TP393.08
  17. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  18. Behavior -based botnet detection method,TP393.08
  19. Based on TCP / IP, no shaft offset Remote Monitoring System Design,TP277
  20. Study browser security issues and solutions,TP393.092
  21. The Research of Security Issues in Cognitive Radio Networks,TN915.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Specific applications
© 2012 www.DissertationTopic.Net  Mobile