Font Size: a A A

Study On The Intrusion Detection System Based On Genetic Algorithmic

Posted on:2006-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:B Q XiangFull Text:PDF
GTID:2168360155472468Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Dealing with office affairs through Internet has become quite common with thedevelopment of technologies of computer, network and communication. People areenjoying the convenience of this while being often bothered by the problems of infosecurity, which are getting worse and worse because of the more and more advancedintrusion means by the hackers. In this case, the passive anti-intrusion technology offirewall has become far less than enough. The author thinks the research andapplication of intrusion detection technology can be one solution to this problem.Currently, the main network security technologies are focusing on encryption, ID,access control and firewall, and most of them have bug and deficiency. DevelopingIDS (Intrusion Detection System) can make up for part of these bug and deficiency,the activity of IDS, for instance. Up to now, the research on IDS has come down tomany aspects from the system itself to the relevant subjects, and has promoted itsdevelopment in different levels.This paper analyzes the status of network security technology, finds out theproblems of the accuracy of building the pattern warehouse based on study the IDS,raises the countermeasure by applying the Genetic Algorithmic in IDS technology,and succeeds in combining the IDS and the Genetic Algorithmic. During practicingthe Genetic Algorithmic, the author has modified the function, which led into a betterresult. This has been proved effective and practical by the result of the author'sexperiment.Although, in fact, the application of GA in the IDS that makes the IDS hasintelligence is still in experimental phase, there are many aspects to be studied onthe IDS in the future. The author believes that the IDS will come into commonuse like the Firewall with our hard work on it.
Keywords/Search Tags:network security, intrusion detection, Genetic Algorithmic, Pattern warehouse
PDF Full Text Request
Related items