Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Intrusion Detection Techniques Based on Double Zero Copy Model for High-Speed Network

Author: ShiFei
Tutor: ShiZuo
School: Northeastern University
Course: Computer System Architecture
Keywords: High-speed network Intrusion Detection Zero-copy Two - zero-copy model Pattern Matching Protocol analysis
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 43
Quote: 0
Read: Download Dissertation


Intrusion detection system as a proactive security tools, found before suffered harm in computer network intrusion attacks, and the invasion of the interception, alarm, to provide security for the computer network. However, with the emergence of a large number of high-speed network technology, the intrusion detection system is facing a huge challenge. Currently, intrusion detection systems generally have higher packet loss rate, false negative rate and false alarm rate. How to improve data collection and storage capacity of the intrusion detection system, how to accelerate the speed of data detection is the key to solving this problem. In order to solve the problem of high-speed network intrusion detection system there is a higher packet loss rate, data acquisition and data storage systems for intrusion detection, the paper proposes a double-zero the copies model (DZCM), zero-copy packet capture technology and The copy storage technology combination. First of all, this important part of data acquisition, in-depth analysis based on traditional packet capture technology, the paper proposes an improved zero-copy packet capture technology, to improve the performance of data acquisition, and reduce the packet loss rate. Then, taking into account the importance of data storage speed of the intrusion detection system, data storage part of the system, the zero-copy techniques used in data storage, to improve the speed of data storage, and indirectly reduce the packet loss rate. Next, in order to reduce the rate of false positives and false negative rate of intrusion detection systems, data detection part, this paper, the intrusion detection system used pattern matching algorithm, proposed an improved mode matching algorithm (SFBM). Proved by experiments, SFBM algorithm to improve the speed of pattern matching with high detection efficiency; same time by the study protocol analysis technology, this paper gives the the protocol analysis algorithm, and SFBM pattern matching algorithm and protocol analysis technology combined, compared with good solution to the problem of the false negative rate and a higher rate of false positives in intrusion detection system. Starting from the development of intrusion detection, the proposed research topic and thesis structure. Then given a reference model of an intrusion detection system model in several key technology, including data acquisition, storage, testing and other technical analysis and improved technology. Finally, through experimental tests prove that plays a very important role in the improved technique for improving the performance of the intrusion detection system.

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  3. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  4. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  5. Research on Relationship Extraction Based on Semantic Pattern Matching in Web Environment,TP391.1
  6. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  7. The Research and Realization of Unwanted Code Monitoring System Based on Heuristic Algorithm,TP393.08
  8. An Intrusion Detection System for High-Speed Networks,TP393.08
  9. Research on the Security in Wireless Sensor Network,TN915.08
  10. The Implementation of Embedded TCP/IP Stack Based on the Method of Operating System Driver,TN915.04
  11. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  12. WiMAX protocol analysis software design and implementation,TP311.52
  13. CUDA-based regular expression matching system design and implementation,TP311.52
  14. Windows Kernel Rootkit Detection Technology Research,TP309
  15. Virtual file system fragmentation zero-copy collation system,TP316.7
  16. Automated Fuzz Testing network protocol vulnerabilities mining method,TP393.08
  17. Zombie control behavior recognition and detection method of,TP393.08
  18. PCI-E interface -based data acquisition system software design and implementation,TP274.2
  19. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  20. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  21. FSVM -based data mining method and its application to intrusion detection research,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile