Font Size: a A A

Research Of Network Intrusion Detection Model Based On The Incorporate FP-Growth

Posted on:2008-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:N WangFull Text:PDF
GTID:2178360215458223Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the extensive application of network and other information technology, the security of network system becomes very important. The intrusion detection is the key technology and important method of protecting the security of network system. It is one of the important topics about system structure of network security.The ability of present technology of intrusion detection is weaker to the new attack or the unknown characteristic. In addition, the accuracy and real time of detection can not achieve the demand of practical application. And it is more difficult for traditional intrusion detection to meet the request under the condition of so many network data traffic.The intrusion detection making use of the data mining technology can effectively detect the known intrusion and unknown attack pattern. Therefore, it is very significant to study the algorithms of data mining in order to enhance the accuracy and the effectiveness of intrusion detection.The construction of intrusion detection model and the application of the data mining algorithm in the intrusion detection are the main content of the thesis. Firstly, the basic theory and relative technology of intrusion detection and data mining are studied and analyzed. The algorithm of FP-Growth is mainly studied. To further reduce the time complexity of traditional FP-Growth, an Incorporate FP-Growth Algorithm is put forward. To compare two kinds of algorithms, the experimental testing programs are designed according to the two algorithms. And then, the model framework of network intrusion based on data mining is constructed. The structure graphs of function modules in the model are respectively designed. Meanwhile, the functions of data gather module, data analysis module and management module are expatiated. For the core module of the model--data analysis module, the Incorporate FP-Growth Algorithm is adopted to mine data. Finally, the implement of some function modules and performance target are discussed.
Keywords/Search Tags:Intrusion Detection, Data Mining, Association Rules, FP-Growth Algorithm, Incorporate FP-Growth Algorithm
PDF Full Text Request
Related items