Dissertation > Excellent graduate degree dissertation topics show

Research on Network Intrusion Detection and Rules-Matching Methods

Author: TianYingHua
Tutor: LiuYanZuo
School: Jilin University
Course: Software Engineering
Keywords: Intrusion Detection Data Mining Rules match Firewall Architecture
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 93
Quote: 0
Read: Download Dissertation


The rapid development of Internet technology , the reality of the network becomes more and more important in our daily life and work . Modern computer and information technology security change people's way of life , at the same time, the domestic and international hacker activities have become increasingly frequent , hacker attacks battle become more significant and increasingly concealed , viruses, worms and Trojan horses everywhere online rampant. Increasingly serious network security problems brought a lot of inconvenience for people to work and learn , and become a major obstacle restricting the development of network technology . Intrusion detection security technology as a proactive defense . In this paper, the intrusion detection system adaptability , scalability , efficiency and low , focuses on how data mining techniques in intrusion detection , as well as the advantages and disadvantages of the various rules matching algorithm and efficiency . This paper the design and implementation of NIDS network intrusion detection system intrusion detection techniques and data mining technology combination , through WINPCAP capture network packets , and its processing into the data mining algorithm can handle the data format . Elaborate firewall technology .

Related Dissertations

  1. Independent college teaching system based on career planning,G642.4
  2. A Study on the Curriculum Reform of Higher Vocational Education,G712.3
  3. A Study on Healthcare Product Marketing Based on Data Mining Technology,F426.72
  4. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  5. Bing- thick academic thought and clinical experience and empirical studies apply to turtle soups treatment of chronic kidney disease,R249.2
  6. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  7. The Design and Implementation of Bicluster Data Analyzing Software,TP311.52
  8. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  9. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  10. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  11. Research on Traceability and Incremental Consistency of the MDA Model Transformation,TP311.5
  12. Research and Design of Web Reports Based on Service-Oriented Architecture,TP393.09
  13. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  14. ECG Detection Analyzer Based on Windows xp Embedded System,R197.39
  15. Based on data mining research tax audit case selection,F812.42
  16. Based on cloud model software trustworthiness evaluation model,TP311.53
  17. Community-oriented education, personalized learning system and its implementation,TP391.6
  18. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  19. Data warehouse technology in the banking customer management systems research and implementation,TP315
  20. Design to E-learning System in Senior Vocational School Base on Moodle,TP311.52
  21. Southern Jiangxi Hakka Architecture Aesthetics Analysis,TU-80

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile