Dissertation > Excellent graduate degree dissertation topics show

The IDS detection algorithm and technology research

Author: XuHong
Tutor: QinZhiGuang
School: University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: intrusion detection pattern matching data mining Aho-Corasick(AC) algorithm quantum genetic algorithm
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 68
Quote: 0
Read: Download Dissertation

Abstract


With the development of Internet, computer network security problem has been widespread concern, and been studied to develop some security and defense mechanisms. Among them, the intrusion detection developped in recent twenty years is a security mechanism to dynamically monitor, prevent or resist the intrusions. Compared with traditional preventive security mechanisms, intrusion detection has the advantage of intelligent monitoring, real-time detection, dynamic response and easy to configure and so on. With application of intrusion detection ,the security of network has been further improved.Intrusion detection has become a key indispensable technology to computer security defense system.In recent years, the rapid development of Internet and the ever-changing attack means have brought new challenges to intrusion detection. It requires intrusion detection technology having more excellent performance to meet the challenges.As the core of intrusion detection, detection algorithm and technology is key factor to influence intrusion detection performance. Therefore, In this paper, IDS detection algorithm and technology has been researched. Firstly, intrusion detection technology has been analysised in briefly. Then, misuse detection technology and anomaly detection technology have been researched. Innovation has been made.Summarized as the following two points:1. For misuse detection, AC algorithm has been analysised. Based on finite state automation storage compression, an improved double compression AC algorithm has been put forward .Verified by experiment comparing with basic AC algorithm, double compression AC algorithm improves the storage efficiesncy, accelerates the detection speed.2. For anomaly detection, clustering for intrusion detection has been analysised, and been converted to the combinatorial optimization problem. A clustering intrusion detection techonology based on quantum genetic algorithm has been put forward. Its good detection performance has been verified by experiment.

Related Dissertations

  1. A Study on Healthcare Product Marketing Based on Data Mining Technology,F426.72
  2. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  3. Bing- thick academic thought and clinical experience and empirical studies apply to turtle soups treatment of chronic kidney disease,R249.2
  4. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  5. The Design and Implementation of Bicluster Data Analyzing Software,TP311.52
  6. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  7. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  8. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  9. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  10. Based on data mining research tax audit case selection,F812.42
  11. Community-oriented education, personalized learning system and its implementation,TP391.6
  12. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  13. Data warehouse technology in the banking customer management systems research and implementation,TP315
  14. Design to E-learning System in Senior Vocational School Base on Moodle,TP311.52
  15. Design and Development of Teaching Quality Assessment System Based on Data Mining,TP311.13
  16. The Application of Association Rules Algorithm in Higher Vocational Colleges’ Endorsement of Impoverished Students,G717
  17. Based on Data Mining Technologies in Urban Water Supply Analysis and Decision,F299.24;F224
  18. Research on Application of Data Mining Technology in Degree of Satisfaction Analysis of Television Customers,TP311.13
  19. Web Usage Mining and the Research of Personalized Recommendation,TP311.13
  20. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  21. Data Mining of Application in the School Management and Training Students,TP311.13

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile