Font Size: a A A

The Study Of Network Intrusion Detection Technology Based On Genetic Algorithm

Posted on:2013-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:L G HuangFull Text:PDF
GTID:2218330371461614Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the computer network technology and the rapid development of Internet, especially in the last two years, government departments, military agencies, financial institutions, enterprises of computer network frequently suffered hacker attacks. The attacker can calmly for those with no safety protection network of attack and invasion, such as the denial of service attack, engaged in the unauthorized access, wanton steal and manipulate important data information, install the back door monitor process to get information, communication at any time within the computer virus, destroy the host, and so on. Attack and invasion to these institutions and enterprises events brought huge economic loss and image of the damage, and even a direct threat to national security.As the main safety means firewall, cannot have satisfied people on network security needs. Developed in recent years to IDS (intrusion detection system) for firewall and as beneficial supplement, can help the network system quickly find that the occurrence of network attack. IDS is considered to be the second way after a firewall security gate, it can not affect the performance of network in the network to monitor, and thus provide for internal and external attack against the incorrect operation and the real-time protection, become the core research field of network security, to make up for firewall and other traditional technology and shortcomings. In recent years, intrusion detection technology have made a great progress, but as the network security technology, especially the hacker attacks the development of technology, as well as the electronic commerce, the electronic government affairs, the rapid development of Internet application, existing network scale and speed of the intrusion detection system efficiency and processing power put forward higher request, the traditional test system will usually for processed the data is too big and happen to test events such as omission invasion, and therefore improve the detection speed analysis caused extensive concern of the professionals. In this context, in order to effectively enhance the intrusion detection system the detection of the speed and the performance of the whole system, this paper based on the genetic algorithm in network intrusion detection technology research. In this paper, first, the intrusion detection system at home and abroad and its development were introduced in this paper, aiming at the existing intrusion detection system of the common defects and problems, in the thorough analysis of network attack and based on the characteristics of the invasion, the genetic algorithm characteristics of the survival of the fittest, we adopt the host of real-time data flow and system resources use pattern, the system of the core documents visit state, etc and test host the abnormality of calculation, which can effectively detect the invasion of deeds, based on genetic algorithm network intrusion detection technology method to study the system.In this paper trying to improve the feasibility of the method and the detection rate and reduce the system by mistake examining rate and has improved results, Second is established based on genetic algorithm testing model, to change network packets for binary code form chromosomes and produce the initial population, through the introduction of weights and the degree of punishment, error parameters such as level of the objective function fitness for effective control, and finally the model is simulated.The simulation results show that the genetic algorithm based on the intrusion detection technology has higher detection rate and low by mistake examining rate, has the research significance and real application value.
Keywords/Search Tags:Intrusion detection, Genetic Algorithm, Network security
PDF Full Text Request
Related items