Font Size: a A A

The Study On The Application Of Prediction Model In Intrusion Detection

Posted on:2006-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:J YiFull Text:PDF
GTID:2168360155459760Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Intrusion Detection is an important security technology of protecting information system aswell as firewall and data encryption techniques. It has great capabilities in identifying themalicious behaviors in networks and responding to them. As the important composition part ofthe security system and the indispensable supplement of other safe practice means, people paymore attention to Intrusion Detection System (IDS), and are more dependent on it. ThoughIntrusion Detection System (IDS) can measure, react and protect the information system in realtime in theory, it has its own evolution like any other systems. IDS products have somelimitation and fragility at present, and may receive various kinds of attacks standing in thebreach. With the popularization and application of Internet, how to effectively find, follow anddeal with the potential safety hazard in time in the environment of Internet has proposed higherdemand to IDS.At home and abroad, we generally adopt the intelligent method to solve these problems atpresent, for example, neural network technology, data mining, etc. And data mining is a moreideal method at present.However, data mining has its own disadvantages such as the problem of "sharp boundary"and rigorous requirement to the precision of data sets. Noise in training data set will warp theresult. Thus we apply the fuzzy theory in our research. Differing from classic set theory, fuzzyset theory uses a value in the close interval [0,1] to denote the extent that an element belongs tothe fuzzy set. Which is a more rational method that is like human thinking.The thesis researches several problems in the field of IDS and proposes some improvingmethods. The main researches in this thesis are as follows:1. This thesis not only analyzes the present IDS models and IDS technologies also points out the defect in them.2. In the intrusion detection method which is based on the pattern match, we mainly adopt the idea of protocol analysis to dispose the data package, and analyze two kinds of...
Keywords/Search Tags:Intrusion detection, pattern match algorithm, fuzzy logic, subjection function, prediction model
PDF Full Text Request
Related items