Dissertation > Excellent graduate degree dissertation topics show

Research on the Advanced Model of Automated Intrusion Response Based on the Intrusion Prediction

Author: WangZuZuo
Tutor: ChengXiaoPing
School: Southwest China Normal
Course: Applied Computer Technology
Keywords: Intrusion Detection System Hybrid intrusion detection system Intrusion Response Automated Intrusion Response Alarm events Correlation Event Scale Prediction algorithm Precursor Successor Strategy classification
CLC: TP393.08
Type: Master's thesis
Year: 2005
Downloads: 89
Quote: 0
Read: Download Dissertation


The Internet as one of the most significant inventions in the latter half of the last century, produced a significant and far-reaching influence on the whole of human society. Network at the same time has brought us convenience, but also to make our resources visited by tens of thousands of users become more vulnerable, therefore, to protect computer resources from damage, and to ensure that the stored data from malicious users theft destruction or abuse becomes particularly important. In order to achieve this goal, a lot of security tools have been developed, using the intrusion detection system (Intrusion Detection System, IDS) is one of them. Faced with a large number of network intrusion events, intrusion detection and intrusion response techniques are very important, but most of the current domestic and international research focused on the detection of the intrusion detection system technology, the existing IDS already has a state-of-the-art detection technology, especially hybrid based intrusion detection system (Hybrid Intrusion Detection System), it can not only monitor the activities of the network packet anomalies can also be found from the system host log information; contrary to the detection technology, intrusion response research has lagged far behind, a lot of response still remain However, the experiments show that the response time succeeded in preventing an invasion is a crucial stage in the manual response. Intrusion response system response speed is divided into three categories: alarm-type response system, response system manually, auto-response system, which automatically responds faster to make the immediate reaction of the intrusion event and become the ideal response, but also a hot topic of current research. Response mechanisms are in response to a single alarm event afterwards, ignore the links that may exist before and after the attacks, combined with the response system to give a response for each alarm event, often because of false positives generated analysis engine incident The response caused unnecessary consumption of system resources Worse still lead to paralysis of the entire system. Based on the above background, the authors proposed a hybrid IDS architecture auto-response model based on the forecast improvement invasion. In this model, the authors introduced the event and event classification thinking, the use of a hybrid IDS can capture the advantages of the more comprehensive attacks, the first filter responds to all alarm events, and in response to the current alarm event at the same time according to the relationship between the alarm information, can be further

Related Dissertations

  1. Executive MBA education background , corporate performance and stock market wealth effect,F272;F832.51
  2. Study on the Problems of Subsequent Farmers Education in the New Rural Construction,G725
  3. Margaret Long 's piano playing and teaching ideas,J624.1
  4. Small perturbation singular closed orbit near the successor function smooth,O175.12
  5. Bifurcation Analysis in Heterodimensional Cycles and Cancer Models,O175.12
  6. Design and Implementation of the Prediction of Pre-miRNAs and Mature Mirnas,TP18
  7. The Preparation of Ordered Porous Ceramic Joint and the Application Study on the Joining of C_f /SiC Composites,TB332
  8. Byte-stream technology research and implementation of full-text search,TP391.3
  9. Augustus’ Staff Policy,K126
  10. Our family business powers heritage issues,F276.5
  11. Study on Inside Mode of Training Successor in China,F272
  12. Family Business Enterprises Successor Choice Research Based-on the Lifecycle Theory,F272
  13. Succession Planning and Succession Elements’ Influence on Succession Performance,F272.9
  14. Factors Affecting the Satisfaction with the Succession Process in Family Firm,F276.5
  15. Some Problems on Revision of the Law of Inheritance in Our Country,D923.5
  16. Reflections on the ideological and moral construction of minors,D648
  17. The EIGRP protocol analysis and software analysis,TN915
  18. The timed automata new recognition model and long span area automata research,TP23
  19. U.S. asset acquisition of successor liability rules,D971.2
  20. Inheritance System in Tang Dynasty,K242

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile