Font Size: a A A

TieDong Branch Of The Design And Implementation Of Network Intrusion Detection System

Posted on:2016-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:X M ZhaoFull Text:PDF
GTID:2308330461477955Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the nineties of the last century, access to a variety of embedded devices, various types of sensors, as well as consumer terminal facilities, the scale of the Internet has also been a rapid development. At present, the Internet has penetrated into every detail of the people working and living in, networks, computer systems are increasingly involved in Railway East Branch of security information management, speed up information exchange plays an important effect. However, when the network technologies to bring convenient, efficient and superior iron East Bureau Public Security information management, a variety of network attack has seriously jeopardize their interests.Intrusion Detection System is an important tool in the network security, However as firewall, intrusion detection system may be regarded as an operating system, also there are weaknesses or procedural loopholes, will also become a target for hackers. At present most of the existing intrusion detection systems have the same weaknesses and shortcomings exist: false positives, false negatives than feature would cause too many features time-consuming resources.Relying on the topic " TieDong branch network intrusion detection application development" projects for the current status of intrusion detection system, using data mining techniques, the development of iron East Branch of the law and order brigade network intrusion detection system. Of a detailed analysis of the needs of the system, the use of object-oriented program design, the use of structured design methods, development of the system using C / S mode. The system consists of pre-processing module, the rule base extraction module, knowledge base maintenance module, log analysis module, main parts, the back-end database using SQL Server 2000. The paper describes the functional architecture of the system, carried out a detailed description of each of the sub-function modules, given design. Details of the establishment of database maintenance, and front-end application development, and ultimately to achieve a more rapid and accurate network intrusion detection.
Keywords/Search Tags:Intrusion Detection, Data Mining, The Data Collection, Rule Base, C/SMode
PDF Full Text Request
Related items