Font Size: a A A

Research On Intrusion Detection System Of Wireless Network Based On Cluster And Association Rules

Posted on:2011-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:J PengFull Text:PDF
GTID:2178360305493593Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development and application of wireless networks, more and more people recently pay attention to focus on the security aspects of wireless network systems. So many security technologies of wireless network have been produced one after the other. In these technologies, the most active area is intrusion detection and countermeasures response.The characteristic of wireless networks themselve transmiting signal is wireless signal indistinguishably spread around, it is convenient but insecurity. In the range of wireless coverage, any unknown and distrustful user all can enter inner network through wireless access point. This paper gets the analysis for the wireless networks'frangibility, and introduces their existing the serious disadvantage and the attacker usually using the attacking method.The MAC layer based on 802.11 protocols is more complex than previous IEEE 802 protocol's MAC(Media Access Control) layer. So we can base the frame header to build the behavior pattern of the wireless network user and then base the pattern to distinguish the user's the intrusive behavior. This paper take the data of the MAC frame header as the data source of the intrusion detection algorithm, and provide the pattern of intrusion detection and the detective strategies of anomaly behavior for wireless network.This paper detailedly analyzes the association mining algorithm then proposes a highly efficient association mining algorithm based on itemset matrix and cluster matrix(ISMCM). The algorithm not only improves the efficiency of the association mining but also resolve the updating problems of the association rules when minimum support changed or new transactions are added to the database.This paper builds a pattern of wireless intrusion detection by using ISMCM algorithm, and successfully detects some wireless attack in emulational experiment. The system can fulfill the request of the real time system.In the field of wireless intrusion detection, the research in this paper has definite value at the side of theories and practice, it can provide a useful reference for designing the wireless intrusion detection system.
Keywords/Search Tags:intrusion detection, wireless network, association rule, cluster matrixes(CMa), Itemset matrix(ISM)
PDF Full Text Request
Related items