Font Size: a A A

Research Of Network Security Based On Campus Card System Ussed In University

Posted on:2007-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:X J ZhangFull Text:PDF
GTID:2178360185961010Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Nowadays, with the rapid development of information and network, more and more information is exchanged and managed in digital forms, also with the development of smart card and the generalizing of computer, using IC card in campus information management comes into a tendency. At the same time, the application of IC card has turned from single-using into multi-using, so the complicated application increased the requirement of network security.This paper took the network security of campus card in Nanchang University as the researching object. At the beginning, it briefly introduced the campus card system and the technologies of network security, then combining the actual situation, chose the technology route that integrating data mining with intrusion detection and adopted the thinking that combining online classified misusing detection with offline clustering abnormal detection, finally aimed for the important application server of campus card system expounded a devising project of Intrusion Detection System based on mainframe. In the project, it firstly described the frame of the IDS, then specified its modules and the working principle of them, the modules included the data precondition module, data warehouse module, online classified misusing detection module and offline clustering abnormal detection module, etc. As for the algorithm of rule mining, this paper introduced the association algorithm, sequence algorithm, classification algorithm and clustering algorithm, and also included the description of key attribute and reference attribute, at last, expounded a new algorithm named layer mining of support-diminishing and sliding-window-increasing. It has been looked on as the core algorithm in this IDS and been used to dredge the standard auditing data which were stored in the data warehouse. In the end, it used "password attack" as an instance, discussed the whole running process of this IDS.
Keywords/Search Tags:Intrusion Detection, Data Mining, Campus Card System, Network Security
PDF Full Text Request
Related items