Font Size: a A A

Based On Improved Visualization Of Intrusion Detection Systems, The Cca

Posted on:2007-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y B BiFull Text:PDF
GTID:2208360212470387Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the pervasive use of the Internet, Web architecture is widely adopted in information systems.Due to the open Internet properties; web applications in an open environment are vulnerable to attack from the Internet. In view of the problems facing network security and comprehensive analysis of the intrusion detection, we make great efforts to solve the following questions in this paper. (1) In the traditional intrusion detection, no uniform model with a comprehensive framework can guide the intrusion detection in information visualization application. (2) Conventional testing methods applied to Internet Web Intrusion Detection System, met the detection performance of instability more or less. (3) The traditional intrusion detection systems and intrusion detection model aren't combined close enough. In this paper, we dedicate our focus on the study of visual intrusion detection model algorithms and design and implementation of visualization intrusion detection systems. The invasion examination information visible is advantageous to the security expert and the manager highly effective and the invasion examination system joint operation, thus enhancement invasion examination system examination performance.The first part of generalized analysis invasion examination process, proposed the visible invasion examination system reference model. First in analyzes the domestic and foreign correlations research area the work and the invasion examination system function demand, the performance demand and in the visible demand foundation, this article proposed the visible invasion examination reference model, and the visible invasion examination process will divide into four processes: Historical data visible process, foundation behavior outline process, examination unusual process, current data visible process.The second part of the visual intrusion detection system-the core module visual modeling algorithm is discussed in detail. First of all current visual intrusion detection algorithms for analysis and comparison CCA draw a distinction between performance clustering algorithm can be retained at the same time, but also achieve more precise...
Keywords/Search Tags:intrusion detection, profile creation, curvilinear component analysis (CCA), anomaly detection
PDF Full Text Request
Related items