The Research on User Model for the Network Intrusion Detection System

被引:0
|
作者
Shang, Lei [1 ]
机构
[1] Shandong Univ Polit Sci & Law, Dept Informat Sci & Technol, Jinan, Peoples R China
关键词
vector space model; AVSM; IDS; intruder;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet has become one of the most important tools in the people's lives with the rapid development of the Computer Science and Technology. It is important for everyone to ensure the safety of computer networks. Intrusion Detection System can be helpful for people to use computer network safely. Traditional intrusion detection technologies are based on the behavior of users. The content browsed by intruders is also an important clue for the Intrusion Detection System. In this paper, based on analyzing the traditional user profile, a user model named AVSM (Advanced Vector Space Model) which combined with user's browsing content and behavior is proposed. The experimental results show that, using this model, Intrusion Detection System can analyze both the content and behavior of intruder, and detect the intruder more effectively.
引用
收藏
页码:351 / 358
页数:8
相关论文
共 50 条
  • [21] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [22] Model of network intrusion detection system based on BP algorithm
    Wang, Y.
    Huang, G. X.
    Peng, D. G.
    2006 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, 2006, : 139 - +
  • [23] Intramural Network Intrusion Detection by Monitoring User Behavior
    Zeng, Na
    Zhang, Xiaolong
    Zhang, Hong
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 178 - 181
  • [24] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [25] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [26] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 475 - 478
  • [27] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 204 - 211
  • [28] Research on distributed network intrusion detection system for IoT based on honeyfarm
    Wu H.
    Hao J.
    Lu Y.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 106 - 118
  • [29] Research On Network Security Intrusion Detection System Based On Machine Learning
    Luo, Yin
    International Journal of Network Security, 2021, 23 (03) : 490 - 495
  • [30] Research and Implementation of Intrusion Detection System Based on Artificial Neural Network
    Han Xiaocui
    MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 1421 - 1425