Dissertation > Excellent graduate degree dissertation topics show

The Application of Plan Recognition in the Automated Intrusion System

Author: LiuKeCheng
Tutor: GuWenXiang
School: Northeast Normal University
Course: Computer Software and Theory
Keywords: Plan Recognition Intrusion Detection System Automated Intrusion Response Systems Plan Library
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 60
Quote: 2
Read: Download Dissertation


Intelligent plan recognition is an active research area in artificial intelligence. It has been applied into many research fields such as natural language understanding, knowledge reasoning, agent help and so on. Especially nowadays some scholars combined plan recognition with intrusion detection systems in internet security research and got very good results.Intrusion detection system is to detect intrusion action according to the analysis of host or network activity gathered. Intrusion detection system is classified to based-on host IDS and based-on network IDS.IDS technology is a new generation of security different from tradition security technology. Now research on IDS is focused on intrusion protection and intrusion detection. Intrusion response is mainly implemented in IDS, which limits the performance of response method and response ability. Foreign scholars have carried out research on intrusion response systems and models. With a large amount of network attacks, the intrusion response systems can actively protect the compromised systems and minimize the loss of the system after the intrusion happened.With research on plan recognition and intrusion detection system theory, based-on attribute of plan recognition predicting agent future actions, this paper proposes the idea of using plan recognition in IDS, then gives the plan recognition model in the automated intrusion response system. This model can not only recognize the goal of hostile intrusion plan and the future hostile actions, but also give response action to the actions and even future hostile actions. Thus the model improves the safety of computer system and the Internet domain.

Related Dissertations

  1. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  2. The Application of Plan Recognition in Monitoring the Money Flow for the Stock Market,TP18
  3. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  4. Web optimization methods for monitoring of sensitive information,TP393.08
  5. Design and Implementation of the campus network intrusion detection system,TP393.18
  6. Research of Hierarchical Distributed Intrusion Detection System,TP393.08
  7. IPv6 environment honeypot system research and application,TP393.08
  8. Research on Key Technology of LTE Intrusion Detection Systems,TP393.08
  9. The Design and Implementation of Intrusion Detection System for High-Speed Network,TP393.08
  10. Research and Application of Information Security Technique in Electronic Government Affair,TP393.08
  11. Application and Research of Intrusion Detection System Base on Honeypot,TP393.08
  12. Lightweight Intrusion Detection System Based on Feature Selection,TP393.08
  13. The Research and Application of Firewall and IDS Deployment in the Campus Network Integration,TP393.18
  14. Research and Design of IDS Based on IPv6,TP393.08
  15. Application and Research of Data Fusion in Intrusion Detection System,TP393.08
  16. The Research and Application of Distributed Intrusion Detection System Based on Snort,TP393.08
  17. The Research and Application for Intrusion Detection System in Campus Network,TP393.08
  18. Application of Data Mining Technology in Intrusion Detection System,TP393.08
  19. Intrusion Detection System Based on Peer-to-Peertopology with SuperNode,TP393.08
  20. Investigating Intrustion Detection System Based on Neural Network,TP393.08
  21. Immune-based Intrusion Detection System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile