Dissertation > Excellent graduate degree dissertation topics show

Adaptive Masquerade Intrusion Detection Algorithm Based on Fuzzy Set and Its Application in the Security of ASP Service

Author: ZengJianPing
Tutor: HuangMeiChun;GuoDongHui
School: Xiamen University
Course: Condensed Matter Physics
Keywords: Masquerade Intrusion Hidden Markov Model Interval Fuzzy Set
CLC: TP393.08
Type: PhD thesis
Year: 2006
Downloads: 297
Quote: 0
Read: Download Dissertation

Abstract


Masquerade intrusion is a security problem that is difficult to be dealt with and it exists in many network-based information systems. Theoretically, all kinds of the anomaly detection method could be applied to detect masquerade intrusion. However, due to the variation of user action and the similarity between masquerade user and normal user, ability of the detection algorithm to adapt to different users is lower and the performance improvement is very limit. In our work, we focus on the selection of sliding window size, decision variable, detection algorithm and adaptive model update. All these work are related to the key issues of the intrusion detection algorithm, for example, uncertainty information process and parameters setting, etc. The research work has the important sense both in theoretic and practical factor.The innovation of this thesis is as follow:(1) A method for deciding sliding window size. By applying conditional entropy, a new algorithm for deciding sliding window size is proposed. It is proved that the window size of the HMM is approximately equal to the window size of sequence that is generated by the model.(2) A method to transform the likelihood of sequence to models. Applying genetic algorithm to compute the maximal and minimal value of the likelihood, the sequence’s likelihood can be normalized to a reasonable decision value.(3) A detection algorithm based on interval type-2 fuzzy set. In the algorithm, three features of the user are selected and the corresponding user trustee computation methods are defined, and the final user trustee is got by applying interval type-2 fuzzy set data fusion. And it can improve the ability to deal with uncertainty information in the detection process.(4) A fast clustering algorithm. A new similarity measurement is proposed and model-based clustering is applied to the clustering algorithm. Model update is not necessary in the clustering algorithm, and its computation complexity is lower than that of conventional model-based clustering algorithms while the clustering

Related Dissertations

  1. Packet Loss Recovering Technology for Speech Transmission over Network,TN912.3
  2. Research on Domain Entity Attribute and Event Extraction Technology,TP391.1
  3. Chinese Speech Synthesis System Improvement and Implementation,TN912.33
  4. Extended Hidden Markov Models and Parameter Estimation Based on Genetic Algorithm,O211.62
  5. Research on the Key Technologies fo Speech Recognition for Robot Communication,TN912.34
  6. Research of Segmentation Based Chinese Continuous Speech Recognition Technology,TN912.34
  7. Research and Improvement of IDS Snort Based on HMM Model,TP393.08
  8. Research on Chinese Named Entity Recognition and New Word Detection,TP391.1
  9. Detection of Cell Division Sequence Based-on Hidden Markov Model,TP391.41
  10. Face Recognition based on HMM,TP391.41
  11. Study on Chinese Named Entity Recognition Based on Hidden Markov Model,TP391.1
  12. A Research on Speaker Recognition Algorithm and Speaker Identification System Implementation,TN912.34
  13. The Contourlet-based Statistical Models for SAR Images Denoising,TN957.52
  14. The Research and Implementation on the Key Technology of Internet Public Opinion Analysis,TP393.09
  15. The multimodal fusion news story unit segmentation,TP391.41
  16. The Research and Implementation of Building Semantic Web Based on Probability and Statistics,TP391.1
  17. Research and Implementation of Topic-specific Information Collection Method Based on HMM,TP274.2
  18. Expression Recognition Based on Improved ODP and Gabor Wavelets,TP391.41
  19. Algorithm of Signature Verification Research Based on HMM/DTW TWO-Level Architecture,TP309.7
  20. Research and Implement of Face Recognize Based on HMM,TP391.41
  21. Research on Hidden Group Detection Technology in Financial Transaction Network,TP399-C2

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile