An improved model of intrusion detection

被引:0
|
作者
Shen, Zihao [1 ]
Peng, Weiping [1 ]
Liu Shufen [1 ]
机构
[1] Henan Polytechn Univ, Coll Comp Sci, Jiaozuo 454003, Peoples R China
关键词
pattern-matching; protocol analysis; misuse detection; intrusion framework model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pattern matching is a frequently used detection technology in misuse detection. This paper introduces the pattern-matching process, analyzes the single-mode and multi-mode match algorithm, and then points out the. flaws of intrusion detection system by adopting the pattern matching technology. Protocol analysis technology is a new intrusion detection technology, which is developed on the basis of pattern matching technology. It is from the specific nature of rules of the network communication protocol, by directly finding the would-be-analyzed-byte position, and then takes it out for analysis without the need to have byte-byte comparison. Intrusion detection system based on protocol analysis has some notable advantages. According to the features of the two sides, this paper proposes an intrusion framework model combining the pattern matching technology and protocol analysis technologies. The research indicates that this model can enhance the examination efficiency and reduce the failure to report and misreport.
引用
收藏
页码:966 / 970
页数:5
相关论文
共 50 条
  • [1] An Improved Intrusion Detection Model Design
    Wang Zongjiang
    Li Xiaobo
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 540 - 543
  • [2] An improved DNN model for WLAN intrusion detection
    Wang, Haizhen
    Cui, Zhiqing
    Lian, Zuozheng
    Yan, Jinying
    [J]. COMPUTER JOURNAL, 2024,
  • [3] Intrusion Detection Model Based on Improved Transformer
    Liu, Yi
    Wu, Lanjian
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [4] An improved intrusion detection model based on paraconsistent logic
    Yan, F
    Zhang, HG
    Wang, L
    Yang, M
    [J]. Network Architectures, Management, and Applications II, Pts 1 and 2, 2005, 5626 : 1078 - 1087
  • [5] Intrusion detection model based on improved Apriori algorithm
    Zheng XianFeng
    Wang LiYan
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1189 - 1195
  • [6] Intrusion detection: A model based on the improved vision transformer
    Yang, Yu-Guang
    Fu, Hong-Mei
    Gao, Shang
    Zhou, Yi-Hua
    Shi, Wei-Min
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [7] Research on Intrusion Detection Model Based on improved CPN algorithm
    Luo, Jin-guang
    He, Biao
    Lv, Jinyang
    [J]. 2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [8] Research on Improved Genetic Algorithm for Virus Intrusion Detection Model
    Zhang, Peng
    [J]. PROCEEDINGS OF THE ADVANCES IN MATERIALS, MACHINERY, ELECTRICAL ENGINEERING (AMMEE 2017), 2017, 114 : 721 - 727
  • [9] Intrusion Detection Model based on Improved Support Vector Machine
    Yuan, Jingbo
    Li, Haixiao
    Ding, Shunli
    Cao, Limin
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 465 - 469
  • [10] Improved BP Algorithm Intrusion Detection Model Based on KVM
    Sun, Hao
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 442 - 445