Dissertation > Excellent graduate degree dissertation topics show

Intrusion Detection Based on Immune Wavelet Network

Author: LuoZuo
Tutor: LiuFang
School: Xi'an University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: Intrusion Detection Wavelet Network Immune Algorithm Immune clonal selection algorithm Hierarchical structure coding scheme
CLC: TP393.08
Type: Master's thesis
Year: 2005
Downloads: 137
Quote: 1
Read: Download Dissertation


Intrusion detection is the most studied , the most widely used security technologies . Intrusion detection that identifies the computer and network systems (preferably real-time ) illegal and unauthorized use , misuse and abuse . This identification process can be seen as a classification process (ie, to distinguish what is normal use , which are non- normal use ) . The main research work are as follows : 1 . In this paper, the intrusion detection model based on wavelet network model combined with neural network ( self - learning ability ) and wavelet analysis ( best function approximation ability) advantages . 2. Learning module in the model to solve practical problems in the performance and efficiency largely depends on appropriate optimization algorithm . This paper use in learning module of the wavelet network intrusion detection model based on immune learning algorithm to overcome the slow convergence of gradient learning algorithm easy to fall into local minimum defects . 3. This article instead of using the immune clonal selection algorithm based on immune learning algorithm , better exploration , guided and convergence led to the three need co-operation and mutual balancing process , dynamically allocated based on the antibody - antigen affinity cloning scale through construct more adapted to the specific problem of cloning operator , showing better problem-solving potential . 4. This is the first use of the hierarchical structure of the chromosome coding , coding issues in the wavelet network intrusion detection model do synchronous evolution of the network structure and parameters in the true sense .

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. Research of Power System Reactive Power Optimization Based on Immune Ant Colony Algorithm,TP18
  3. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  4. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  5. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  6. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  7. An Intrusion Detection System for High-Speed Networks,TP393.08
  8. Research on the Security in Wireless Sensor Network,TN915.08
  9. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  10. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  11. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  12. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  13. Web-based intrusion detection system logs Design and Implementation,TP393.08
  14. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  15. Intrusion detection based on data mining technology research,TP393.08
  16. Based on Petri net modeling intelligent algorithm for job shop scheduling,TP18
  17. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08
  18. Research on Parallel and Distributed Intrusion Detection Technologies,TP393.08
  19. Attribute Reduction Based on Rough Set and Weighted SVM intrusion detection method,TP393.08
  20. Research of Intruding Detection Based on DCA and NSA Algorithm,TP393.08
  21. Research on Intrusion Detection Based on Protocol Analysis and Immune Principle,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile