Font Size: a A A

Host-based Instrusion Detection Method Of The Advanced Intelligence

Posted on:2011-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:D W XuFull Text:PDF
GTID:2198330332480640Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the computer technology and the rapid development of network technology, computer invasion is commoner and commoner. Computer security problem has been more and more attention, the firewall as the representative of the traditional network security flaws is exposed, The intrusion detection technology as a proactive security measures is effectively to make up for the shortcomings of traditional network security technologies, while intrusion detection technology is concern to the majority of scholars.The detection method of current intrusion detection system is single, real-time poor, attack recognition rate and other issues. In this paper, based on network security requirements, advanced intelligent method research and linkage mechanism based on Host intrusion detection tot is carried out, intelligent intrusion detection and prevention capabilities linkage model of intrusion detection software is initially developed.This article briefly describes the host-based intrusion detection system works. Secondly, the reference multi-source information fusion and fusion algorithm in the military field, a host-based intrusion detection information fusion model is constructed, with the introduction of the operator, with the application of gray relation and data fusion algorithms. By using standard data sets KDD1999 for simulation experiments, after that the single sensor intrusion detection system is significantly improved performance. The recognition rate is improved and alarm rate is lowerThen the design of intrusion detection system is discussed, distributed intrusion detection system is preliminary inquiried, Attack simulation experiment is used for agency, simulation experiment shows that this method is effective.The finally information entropy theory is for application, by drawing on rough set reduction ideas, the data samples of the invasion is attribute reduced by improved boolean matrix algorithm, while the speed of intrusion detection is increased, and an ideal detection rate is maintained.
Keywords/Search Tags:intrusion detection, gray relation, data fusion, distributed intrusion detection system, attribute reduced
PDF Full Text Request
Related items