Dissertation > Excellent graduate degree dissertation topics show

The Key Technology Research of Intrusion Prevention with Immune Response Function

Author: LiYongZheng
Tutor: LiuJiaoMin
School: Yanshan University
Course: Applied Computer Technology
Keywords: Intrusion tolerant Immune Particle swarm Information fusion Intrusion response OPNET
CLC: TP393.08
Type: PhD thesis
Year: 2013
Downloads: 23
Quote: 0
Read: Download Dissertation


With the development of information technology, network applications continues toincrease and the threats of computer network security are growing day by day. In recentyears, intrusion detection has become a focus of research as a network securitytechnology. As means of attack becomes increasingly sophisticated, intrusion detectiontechniques have become increasingly demanding. Especially the traditional intrusiondetection systems have not solved the current network security issues such as thedistributed attack. At the same time, the response measure of the intrusion detectionsystem is just sending alarm to manager and can not make response in time. For all above,the distributed prevention and the automated response technique are combined here,author chooses the relation key problems in prevention mechanism as research object,makes embedded theoretical research and experimental analysis, and has achieved newfruit.There is not an effective prevention and response mechanism to treat distributedintrusion attacks, distributed intrusion prevention system is designed in this thesis. Thesystem has two special modules, alarm pretreatment module and response treatmentmodule. The alarm pretreatment module is the alarm information fusion system based onattribute fusion in decision level. The alarms are fused by fuzzy comprehensiveevaluation method and immune evolution algorithm. The number of alarm is reduced andthe effective alarm threads are got. The response treatment module is the decision modelbased on risk assessment and it combies the response time decision and the responsemeasure decision to overcome the problem that the response is premature or hysteresis.The traditional intrusion detection systems have a shortcoming, that weak detectionof unknown attacks, the immune prevention system based on intrusion tolerant has beendesigned. The innate immune and dangerous theory are used in this prevention systemand combine this two theories to treat the unknown attacks. The fault tolerance anddamage isolation technologies in intrusion tolerance theory are used as the innateimmune response’s methods and the responser can use these methods to response when the value of danger signal is beyond threshold. The malicious transaction are isolatedbased on the trust picture and the resource of the system can recovered based on thedynamic semi-active replication strategy.In order to overcome the defect that the intrusion detection system based onanomaly lack an effective training sets, data classification method based on network datain real condition is bring forward. The PSO-FCM clustering algorithm is used to clusterthe real nertwork data. At the same time, the number of cluster is adjusted by usingimmune evolution algorithm. The problem that the number of cluster need to beidentified is overcome. After the network are clustered, the signals “normal” and “attack”are labeled for these clusters by lable algorithm based on abnormal factor. Then thenormal packages and the abnormal are got for this network and these packages can beused as the training sets for normal template.In order to simulate the distributed intrusion attacks accurately and use these to testthe intrusion prevention system, the intrusion attack module and intrusion preventionsystem model are established based on OPNET Modeler. The intrusion prevention systemis tested by using UDP Flood attack module.

Related Dissertations

  1. Study on Protective Effects of Apple Polyphenol on Immune System Injury Caused by γ-Ray,S661.1
  2. Built-In Self Test Research of Digital Circuit,TN79
  3. Tongue Feature Extraction and Research of Fusion Classification,TP391.41
  4. Research on Feature Extraction and Classification of Tongue Shape and Tooth-Marked Tongue in TCM Tongue Diagnosis,TP391.41
  5. Multi-Sensor Information Fusion and Its Applications on Wearable Computer,TP202
  6. Computing Minimum Distance between Curves/Surfaces Based on PSO Algorithm,O182
  7. Cultivation and Effects of Environmental Factors on Carrying WSSV Virus of Litopenaeus Vannamei,S945
  8. The Preliminary Studies on Characteristics of HCV Quasispecies Variation and Its Immune Escaping Mechanism,R392.1
  9. Effects of Different Reconciled Corn Oils on Antioxidative Stress, Lipid Metabolism Enzymes, and Abundance of Immune-related Genes of Broilers,S831.5
  10. Active Power Filter and Its Application in Distribution Network,TN713.8
  11. Ad hoc network routing protocol performance battlefield environment,TN929.5
  12. Studies on Fermentation of Unconventional Protein Feeds and Their Application in Broiler Diets,S831.5
  13. Improving of Artificial Imune Classification and Anomaly Detection Algorithms,R392.1
  14. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  15. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  16. Research of Power System Reactive Power Optimization Based on Immune Ant Colony Algorithm,TP18
  17. Effects of Different Immunization on the Development of Immune Organs,cell Proliferation and Expression of Apoptosis-relatived Gene in Chicken,S858.31
  18. Bone marrow mesenchymal stem cells in the same kind of heart transplantation on Treg cells in rats,R654.2
  19. Research on Intrusion Detection Based on Feature Selection,TP393.08
  20. Study on Network Congestion Control Method Based on TCP/IP Protocol,TP393.06
  21. A Navigation and Control System of Mobile Robot Designed for Path Following,TP242

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile