Font Size: a A A

Ids Detection Algorithm And Technology Research

Posted on:2010-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:H XuFull Text:PDF
GTID:2208360308967466Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of Internet, computer network security problem has been widespread concern, and been studied to develop some security and defense mechanisms. Among them, the intrusion detection developped in recent twenty years is a security mechanism to dynamically monitor, prevent or resist the intrusions. Compared with traditional preventive security mechanisms, intrusion detection has the advantage of intelligent monitoring, real-time detection, dynamic response and easy to configure and so on. With application of intrusion detection ,the security of network has been further improved.Intrusion detection has become a key indispensable technology to computer security defense system.In recent years, the rapid development of Internet and the ever-changing attack means have brought new challenges to intrusion detection. It requires intrusion detection technology having more excellent performance to meet the challenges.As the core of intrusion detection, detection algorithm and technology is key factor to influence intrusion detection performance. Therefore, In this paper, IDS detection algorithm and technology has been researched. Firstly, intrusion detection technology has been analysised in briefly. Then, misuse detection technology and anomaly detection technology have been researched. Innovation has been made.Summarized as the following two points:1. For misuse detection, AC algorithm has been analysised. Based on finite state automation storage compression, an improved double compression AC algorithm has been put forward .Verified by experiment comparing with basic AC algorithm, double compression AC algorithm improves the storage efficiesncy, accelerates the detection speed.2. For anomaly detection, clustering for intrusion detection has been analysised, and been converted to the combinatorial optimization problem. A clustering intrusion detection techonology based on quantum genetic algorithm has been put forward. Its good detection performance has been verified by experiment.
Keywords/Search Tags:intrusion detection, pattern matching, data mining, Aho-Corasick(AC) algorithm, quantum genetic algorithm
PDF Full Text Request
Related items