- 1、本文档共67页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
北京工业大学工学硕士学位论文Abst
北京工业大学工学硕士学位论文
Abst ract
Intrusion detection plays a more and more important role in computer security. In conventional way,experts analyze data collected by intrusion detection system and abstract rule sets.Manual analysiS iS quite experts:ive because of enormous amount of data.Applying data mining technique in intrusion detection can reduce workload of manual analysiS. However data mining technique also has some problems,such as efficiency and accuracy.ThiS article proposes system architecture and datamining algorithm to enhance the efficiency of datamining intrusion detection
system.
Intrusion detection technology iS analyzed and explored in thiS thesis,and a Datamining and Agent—based Distributed Intrusion Detection Model iS presented in thiS thesiS.Based on thiS model,a Datamining and Agent—based Distributed Intrusion Detection System called DA DIDS iS developed.DA DIDS can be distributed On any host in the network.DA DIDS has good distributed and scalable ability because of its diStributed architecture and flexible agent system.DA DIDS’S real-time study ability can enhance the system’S detection effect.
The agent system of DA DIDS consists of three main modules:transport service agent,datamining agent,intrusion detection agent.Every agent works independently and together to accomplish intrusion detection.Due to the agent system,DA_DIDS comes into being a uniform intrusion detection system that iS competent for the task of host—based and network—based intrusion detection.The introduction of the datamining technique gives the study ability to intrusion detection system,thiS ability makes the system to study and extract eigenvalues from logs of the host or from the network,then enlarge DA DIDS’S rul e database,the ability to detect intrusion can be enforced ceaselesslY.
In thiS thesis,we implement the concrete functions of DA DIDS, clustering algorithm of datamining is analyzed detai ledly in the posterior chapters and is proved feasible throug
您可能关注的文档
- 基于文档的动态工作流管理系统研究与应用-管理科学与工程专业论文.docx
- 基于历史点击数据的分布式信息检索集合选择方法-计算机应用技术专业论文.docx
- 基于声品质评价的摩托车噪声改进研究-车辆工程专业论文.docx
- 基于统计的蒙古文自动词性标注的研究与实现-计算机应用技术专业论文.docx
- 基于千兆以太网的安全优化技术研究及应用-管理科学与工程专业论文.docx
- 基于遗传算法的最大生产率的车削用量优化-机械工程专业论文.docx
- 基于无线数字传输技术的水泥配料控制系统-计算机应用技术专业论文.docx
- 基于嵌入式系统的网络多媒体信息播控系统设计-电路与系统专业论文.docx
- 基于奇异谱分析研究太阳黑子长期行为的周期性及其预报-理论物理专业论文.docx
- 基于纹理合成的图像复原算法研究-计算机应用专业论文.docx
文档评论(0)