Dissertation > Excellent graduate degree dissertation topics show

Research on Distributed Intrusion Detection System Based on Mobile Agent

Author: LiAnNing
Tutor: JiangJianGuo
School: Xi'an University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: Network security Distributed Intrusion detection Mobile Agent Snort
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 70
Quote: 0
Read: Download Dissertation


Intrusion Detection,being a proactive network security protection technology, has become an essential component in network security system. Mobile Agent technology has many advantages for the Intrusion Detection System, particularly is suited to Distributed Intrusion Detection System. At home and abroad, the research of Mobile Agent applied to the intrusion detection is still at an early stage. Many theoretical and practical issues have not yet been satisfactorily resolved.First of all, connecting with relative theory of Intrusion Detection System, This paper designed a model of complete and equal Distributed Intrusion Detection System, based on the Mobile Agent technology. The Intrusion Detection Agents in the model communicate and collaborate in equal collaboration mode. It avoids the "bottleneck" of the key nodes in the system and can effectively detect the Distributed Intrusion.Secondly, it is made that a detailed design of key modules, such as, Intrusion Detection Agent, system communication and alarm information log. The initial emulation examination is also made. The design thoughts are taking open-source programs of Snort as its core, storing intrusion alarm information log with the data table constructed in this paper, carrying on correspondence based on a new communication protocols. Experimental results indicate that the model constructed in this paper has better scalability, rapid response speed and high rate of detection and identification.In addition, two aspects of order matching and bad characters elicitation towards the traditional BM algorithm are improved in this paper, the improved algorithm is used as a core of the string matching algorithms in system detection mechanism, increasing the efficiency of intrusion.Although the system model can be well implemented to distributed intrusion detection in design theory, but further study will be done on the intelligent management, real-time response and various methods of detection.

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Research of Communication Mechanism in the Distributed Network Based on Mobile Agent,TP393.02
  4. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  5. Region-based wireless sensor network key management scheme for research,TP212.9
  6. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  7. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  8. Ship mountain of e-government network security solutions outside the network design and implementation,TP393.08
  9. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  10. Study of snort -based IPS,TP393.08
  11. Zhengzhou, China Unicom office automation network security protection Strategy,TP393.08
  12. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08
  13. Network security assessment model of rough set - based,TP393.08
  14. Design and implementation of intrusion detection system based on association rules,TP393.08
  15. The Occupational secondary schools and campus network planning with the the design,G717
  16. The Research of Network Intrusion Detection System in Campus LAN,TP393.08
  17. The Design of Campus Network Distributed Intrusion Detection System Based on Snort,TP393.08
  18. Research and Implement of Mining Association Rule Based on Snort Intrusion Detection System,TP393.08
  19. Research on Matching Process and Algorithm Improvement of Intrusion Detection,TP393.08
  20. Application and Research of Intrusion Detection System Base on Honeypot,TP393.08
  21. Collaborative Intrusion Detection Research in Peer-to-Peer Network,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile