Font Size: a A A

Bp Algorithm In Ids To Achieve

Posted on:2006-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:G GanFull Text:PDF
GTID:2208360152498325Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The openness of Internet offers great convenience of information sharing and exchange, accompanied with crucial challenges to Information Security. Security issues have evolved into the key problem of information systems. As a kind of active measure of Information Assurance, Intrusion Detection acts as the effective complement to traditional protection techniques. The dynamic security circle, including policy, protection, detection and response, can greatly contribute to improving the assurance ability of information systems and reducing the extent of security threats. After introducing the Intrusion Detection System,we go deep into the Information Safe Parttern and the Distributed Intrusion Detection Systems (DIDS),at once introducing the Data Mining and the This thesis emphasis introduce the New Type Network Intrusion Detection System. This thesis following introduces the setup service for the New Type Network Intrusion Detection System'code.Thesis introduce the Snort Network Intrusion Detection System,contents include:system survey,system configer,work flow, the source code analysis and so on. This thesis introduces compiling the Network Sniffer by myself. This thesis finally introduces the work of New Type Network Intrusion Detection System'code.
Keywords/Search Tags:DIDS, Data Mining, BP Neural Network, New Type Network Intrusion Detection System, Network Sniffer
PDF Full Text Request
Related items