An improved model of intrusion detection

被引:0
|
作者
Shen, Zihao [1 ]
Peng, Weiping [1 ]
Liu Shufen [1 ]
机构
[1] Henan Polytechn Univ, Coll Comp Sci, Jiaozuo 454003, Peoples R China
关键词
pattern-matching; protocol analysis; misuse detection; intrusion framework model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pattern matching is a frequently used detection technology in misuse detection. This paper introduces the pattern-matching process, analyzes the single-mode and multi-mode match algorithm, and then points out the. flaws of intrusion detection system by adopting the pattern matching technology. Protocol analysis technology is a new intrusion detection technology, which is developed on the basis of pattern matching technology. It is from the specific nature of rules of the network communication protocol, by directly finding the would-be-analyzed-byte position, and then takes it out for analysis without the need to have byte-byte comparison. Intrusion detection system based on protocol analysis has some notable advantages. According to the features of the two sides, this paper proposes an intrusion framework model combining the pattern matching technology and protocol analysis technologies. The research indicates that this model can enhance the examination efficiency and reduce the failure to report and misreport.
引用
收藏
页码:966 / 970
页数:5
相关论文
共 50 条
  • [31] Novel Model for Intrusion Detection
    Li Jia\|chun
    [J]. Wuhan University Journal of Natural Sciences, 2003, (01) : 46 - 50
  • [32] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [33] A compound intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Zhang, Q
    Han, ZF
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 370 - 381
  • [34] An improved ensemble approach for effective intrusion detection
    Gulshan Kumar
    [J]. The Journal of Supercomputing, 2020, 76 : 275 - 291
  • [35] Application of improved Clustering Algorithm in Intrusion Detection
    Dai Kunyu
    Hu Bin
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 621 - 624
  • [36] Network Intrusion Detection with Improved Feature Representation
    Lee, Geonsu
    Rhee, Hochang
    Shim, Jae Hoon
    Koo, Hyung Il
    Cho, Nam Ik
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 2049 - 2054
  • [37] An improved ensemble approach for effective intrusion detection
    Kumar, Gulshan
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (01): : 275 - 291
  • [38] Application of the Improved PrefixSpan Algorithm in Intrusion Detection
    Xie, Qingsen
    Yang, Tianqi
    [J]. 2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 6099 - 6103
  • [39] The Application of Improved BP Algorithm in Intrusion Detection
    He, Minwei
    Ma, Xuewei
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 213 - +
  • [40] Improved kernel based intrusion detection system
    Kim, Byung-Joo
    Kim, Il Kon
    [J]. ARTIFICIAL NEURAL NETWORKS - ICANN 2006, PT 2, 2006, 4132 : 863 - 871