Font Size: a A A

Research About The Distributed IDS

Posted on:2006-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiuFull Text:PDF
GTID:2168360155462932Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the complication of intrusion method and network framework, the exclusive detective mode can hardly detect all kinds of intrusions exactly and rapidly, more and more research and application about IDS has began changed into the distributed IDS.There are lot of information to be exchanged among the agents about the distributed IDS. in order to ensure the information safe and integrated , we have to design a information exchange format and make use of encrpytion techniques.One another , study the new effective arithmetic is very important in the research field of the intrusion detection .Firstly,this paper presents a message exchange format based on the XML technology , the message exchange protocol based on the PKI and ECC,DES Encryption, which can effectively ensure the communication safe and integrated. Secondly, theoretically we analyze the feasibility and necessity of using the clustering method in the intrusion detection system., the fuzzy logic with data mining and immune genetic algorithm. Experiment results indicate that the algorithm has good efficiency in identifying the abnormal intrusion.. Of course , there is deficient about the algorithm,considered about their efficiency. In the next way ,we should do further research about application of the intelligent theory in the intrusion detection.
Keywords/Search Tags:Intrusion Detection, information exchange protocol, sequence analysis, clustering, Fuzzy Logic, immune GA
PDF Full Text Request
Related items