Font Size: a A A

The Design And Implementation Of Network Security Intelligent Protection System

Posted on:2006-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:L C ZhaoFull Text:PDF
GTID:2168360155958063Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer networks, lots of problems come out such as net hacker, virus, attack and so on. However, it is very difficult to take effective security protection because of the features of network, which restricts the application and development of computer network security.The application of current production and system of network security is analyzed in this paper. The detection of some security events can be solved by some security productions such as EDS (Intrusion Detection System). But in practice, people who work on network security are often puzzled by lots of security notification events, which make the true harmful security event ignored. There are fewer functions in assistant decision-making and intelligent analysis. Some productions that are represented by security operation center more focus on the management and maintenance of the security production and are difficult to give effective response on whole security events. In addition, though intrusion detection technology is researched and improved by many researchers and institutes, there are many shortcomings such as detection accuracy, detection speed and efficiency.On fully analyzing the security productions such as IDS, security operation center and main technology of intrusion detection and AI (Artificial Intelligence), the intelligent analysis, decision-making, control response, advanced alert and detection of network security events are proposed, artificial neural network and data mining are utilized to analyze, locate, detect and decide the security event. On the base of effective security event detection, the intelligent and automatic control and handling are implemented; the effective detection is implemented too. In the design of the system, on one hand, the mature network technology and device are used; on the other hand, the application of AI...
Keywords/Search Tags:Network Security, Artificial Intelligence, Intrusion Detection, Assistant Decision-making, Intelligent Analysis and Response
PDF Full Text Request
Related items