Dissertation > Excellent graduate degree dissertation topics show

An Intelligent Model of Intrusion Detection System Based on Data Mining Approach

Author: BuXinYu
Tutor: LiuDongSu
School: Xi'an University of Electronic Science and Technology
Course: Information Science
Keywords: Intrusion Detection Data Mining Mobile Agent Clustering method Support Vector Machine
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 152
Quote: 1
Read: Download Dissertation


With the increasing popularity and development of the network , the network has penetrated into every corner of the social life , the network has brought people convenience also brings a range of security issues . The intrusion detection system is an important part of the network security system . Computer security issues have become increasingly prominent , the intrusion detection system put forward higher requirements . However , traditional intrusion detection systems effectiveness, adaptability , scalability , self- learning and other aspects are deficient . Data mining from a lot of noise , random data to extract useful information, agent technology intrusion detection systems can have a clear system structure , good scalability and portability . In this paper, data mining technology and intelligent detection agent intrusion detection system , intrusion detection system framework based on data mining , Agent technology . The prototype design of the the collaborative detection systems to communicate with each other based on multi-agent framework , through collaborative detection agents , build a hierarchical protection system architecture . Mobile Agent Intelligent , mobility , migration between network nodes to detect intrusions . This paper presents a cluster analysis and SVM - based intrusion detection algorithm to reduce the training time of large-scale data , and under the premise of ensuring the classification accuracy of SVM discriminant efficiency .

Related Dissertations

  1. Research on Automatic Detection Algorithm for Substructure Distress of Highway Pavement Based on SVM,U418.6
  2. Research on Autamatic Music Structrue Analysis,TN912.3
  3. Research on Transductive Support Vector Machine and Its Application in Image Retrieval,TP391.41
  4. Fault Diagnosis Method Based on Support Vector Machine,TP18
  5. Process Support Vector Machine and Its Application to Satellite Thermal Equilibrium Temperature Prediction,TP183
  6. A Study on Healthcare Product Marketing Based on Data Mining Technology,F426.72
  7. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  8. Bing- thick academic thought and clinical experience and empirical studies apply to turtle soups treatment of chronic kidney disease,R249.2
  9. Research of Communication Mechanism in the Distributed Network Based on Mobile Agent,TP393.02
  10. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  11. Research for Infrared Image Target Identification and Tracking Technology,TP391.41
  12. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  13. The Design and Implementation of Bicluster Data Analyzing Software,TP311.52
  14. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  15. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  16. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  17. Study on the Road Condition Monitoring Based on Vehicular 3D Acceleration Sensor,TP274
  18. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  19. Research of Diagnosing Cucumber Diseases Based on Hyperspectral Imaging,S436.421
  20. Based on data mining research tax audit case selection,F812.42
  21. Community-oriented education, personalized learning system and its implementation,TP391.6

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile