Font Size: a A A

An Invasion Detection Analysis On The Basis Of Hacking Patterns

Posted on:2010-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:L Q WangFull Text:PDF
GTID:2178330338485499Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Due to high false negative rate, inefficient detection of unknown attacks and difficulties in accurately determining the occurrence of certain crafty attacks in the current Intrusion Detection System (IDS), this thesis makes a deep research on the intrusion detection technology based on the characteristics of the hacker attack. Firstly, the current situation of the development of the intrusion detection technology is summarized and elaborated in the thesis. It describes the classification measures of the hacker behaviors and the intrusion detection, and establishes references and determining models to assort the hacker behaviors. The thesis then focuses on the characteristics and the severity of the hacker behaviors. It defines the hacker behavior and its characteristics, and provides measures to determine the hacker attack. It disserts on the correlation analysis of the hacker attack and its application. Based on certain experiments, the thesis innovatively studies the main characteristics and the rule of the hackers'communicating behavior, and works out applied detecting measures, assessing models of the severity and their applications. Finally, from the perspective of security protection, the thesis illustrates the classification models of the hacker attack involving systems and technologies, and makes a preliminary forecast of the future development of the intrusion detection. The thesis gives a good reference on how to optimize the measures of detecting intrusions, effectively assess the severity of intrusions, establish countermeasures, and further improve the security protection of the computer network.
Keywords/Search Tags:hack behavior, characteristics, intrusion detection, research
PDF Full Text Request
Related items