Font Size: a A A

Research On Network Defense Technology Based On Intelligent Gateway

Posted on:2020-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:J J CaiFull Text:PDF
GTID:2428330572467210Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The rapid development of computer communication technology has promoted the rapid advancement of technology.Nowadays,the Internet and the Internet of Things have entered the production and life of people.At the same time,a large number of network intrusion behaviors have emerged.These behaviors attack the home network environment through the network.Theft of family information leads to the inability of people to protect their economic assets and even their lives.This makes the improvement of network defense technology of great significance.In this paper,a network intrusion detection system based on Snort engine is applied to the intelligent gateway to protect the home network in real time.And the Snort engine can not detect the shortcomings of the new network intrusion behavior in the network,combined with machine learning and data mining technology,using logistic regression algorithm and Apriori algorithm,adding prediction module and rule dynamics in the system.The generation module enables the Snort engine to have the ability to automatically generate rules based on abnormal data packets in the network.In order to reduce the system's packet loss rate and enhance the real-time detection performance of the system,our three-step rule dynamic matching algorithm for the Snort engine is also Some optimization measures have been made to reduce the number of matching of the system.Improve system performance in both directions.Through the research and optimization of the Snort system in the intelligent gateway,the detection efficiency of the network defense system is improved,and the network intrusion detection system can better protect the network environment security in real time and give the user a good home network environment.
Keywords/Search Tags:machine learning, intrusion detection, logistic regression algorithm, Apriori algorithm, data mining
PDF Full Text Request
Related items