Dissertation > Excellent graduate degree dissertation topics show

The Research on Intrusion Detection Model on Wavelet Neural Networks

Author: ZhouXianChun
Tutor: LiuZhenYu
School: Central South University of Forestry Science and Technology
Course: Applied Computer Technology
Keywords: rough sets wavelet neural network intrusion detection
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 16
Quote: 0
Read: Download Dissertation


With the abroad applications of the internet, network intrusion and attacks increase rapidly. The issue of computer network security becomes and more severely. IDS (Intrusion Detection System) as a dynamic security.Although the existing IDS can detect the most of attacks, but with the rapid proliferating of network flux the audit data is also increase rapidly, In order to pick up representative characteristic of system mode from a great deal of audit data and construct a intelligent and efficient IDS, this paper adopt a creative IDS based on wavelet neural network improved by rough sets. The method full use rough sets theory as a new mathematical tool to uncertain and vague data analysis has good data mining capability and advantages of neural network, such as learning form itself, association memory and identification unknown intrusion type.Firstly, we have an in-depth study on intrusion detection, rough sets theory and wavelet neural network technologies, and search the feasibility that wavelet neural network and rough sets theory can be applied to anomaly intrusion detection.Secondly, based on academic study we present a network-based intrusion detection system. The emphasis of this thesis is network-based anomaly detection model using wavelet neural network and rough sets theory.Finally, the effectiveness of this model is evaluated in an experiment kddcup99 Intrusion Detection data sets.The computer simulation experiments proved that the IDS based on Wavelet Neural Networks improved by rough sets is better than any other IDS on detection ratio and misreporting rate, when the training data up to 20% of the total data the minimum detection rate and maximum misreporting rate attain to 93.23% and 2.7% respectively, IDS based on rough sets improved a difficult problem on how to choose characters when use neural network in intrusion detection system and "multi-dimensional" problem of WNN. The simulation experiments in this paper proved the identification system based on wavelet neural network has accuracy judgment ability when the quantity and ratio of training network’s data is selected properly, In which the attack distinguish rate can up to 97.21% like DoS. So the corresponding taking-precautionary measures of network security may be adopted to aim directly at detected out intrusion action. This is of practically certain value for improving security of the computer communication network.

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. Methodology for Linkage-map-based Quantitative Trait Loci Synthesis Analysis,S562
  3. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  4. The Design of the Coal Mine’s Safety Evaluation System Based on Wavelet Neural Network,TD79
  5. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  6. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  7. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  8. An Intrusion Detection System for High-Speed Networks,TP393.08
  9. Research on the Security in Wireless Sensor Network,TN915.08
  10. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  11. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  12. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  13. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  14. Web-based intrusion detection system logs Design and Implementation,TP393.08
  15. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  16. Intrusion detection based on data mining technology research,TP393.08
  17. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08
  18. Research on Parallel and Distributed Intrusion Detection Technologies,TP393.08
  19. Elevator Product Configuration Rules Dynamic Incremental Updating and Schemes Optimization Technologies and Their Applications,TU857
  20. The improved intelligent algorithm - based electric locomotive traction transformer fault diagnosis technology research,U269.6
  21. Attribute Reduction Based on Rough Set and Weighted SVM intrusion detection method,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile