location:Home > 2018 VOL.1 Feb No.1 > Research on Network Intrusion Detection Technology in Dynamic Complex Background

2018 VOL.1 Feb No.1

  • Title: Research on Network Intrusion Detection Technology in Dynamic Complex Background
  • Name: Bradley Moses
  • Company: Korea National University of Arts, Korea
  • Abstract:

    With the advent of the era of Internet, network has been widely used in the production and living, but with the popularity of the Internet and use, network security problem has become the hot topic. Especially now that the network of all kinds of attack is becoming more and more difficult to prevent, conventional technology has been difficult to meet the demand of people, to prevent the current urgently need a kind of complex network intrusion detection technology, to ensure the network normal use. According to the above problems, based on the dynamic network intrusion detection under complicated background research for the subject in-depth research, under the background of dynamic complex network intrusion detection technology for detailed instructions, and detailed lists the basic train of thought and packet capture detection system model and system, etc., and then analyzing the advantage of detection system technology, the network intrusion detection system has been proved by test can fast accurate for intrusion detection, as well as corresponding prevent invasive.

  • Keyword: The network invasion; Anomaly detection; Detection technology; Network security;
  • DOI: 10.12250/jpciams2018010118
  • Citation form: Bradley Moses.Research on Network Intrusion Detection Technology in Dynamic Complex Background[J]. Computer Informatization and Mechanical System, 2018, vol. 1, pp. 6-10.
Reference:

[1] Wang Jun, Wang ChongJun, Xie JunYuan, et al. Research on Agent-based Intrusion Detection Technique Based on Agent-based Network Intrusion Detection Technology[J]. Computer Science, 2006, 33(12): 65-69.
[2] Wu Zhuang, Chen Jiaxin, Wang Keping, et al. Improved IPv4/v6 Network IDS Technology An Improved IPv4/v6 Network Intrusion Detection Technology[J]. Computer Science, 2011, 38(6): 140-141 .
[3] Shi Zhicai, Xia Yongxiang, Shi Zhicai, et al. Survey on intrusion detection techniques for high-speed networks. Research on intrusion detection technology in high-speed network environment[J]. Journal of Computer Applications, 2010, 27(5): 1606 -1610.
[4] Li Tian, Li Tian. Research on network intrusion detection technology based on improved K-means clustering algorithm [C] National Conference on Computer New Technology and Computer Education. 2009..
[5] Kan Yuan, Zhang Guoqing, et al. Application research of key technologies in network intrusion detection system [C]// National Conference on Computer New Technology and Computer Education. 2010.
[6] Zhang Yong, Zhang Deyun, Li Shenglei, et al. Research and Implementation of Network Intrusion Detection Technology Based on Hierarchical Structure[J]. Small Computer Systems, 2001, 22(1): 41-44.
[7] Wu Chengzhen, Yin Jianping, Cai Zhiping, et al. Research on Pattern Matching Technology Based on Multi-core Platform in Network Intrusion Detection System[J]. Computer Engineering and Science, 2009, 31(9):1-4.
[8] Zhang Jihua, Jiang Tianfa. Research on Self-defense Technology of Network Intrusion Detection System Based on Information Security[J]. Journal of Wuhan University of Technology, Transportation Science and Engineering, 2007, 31(6): 1102-1105.
[9] Zhuang Yi, Tian Ming, Gu Jingjing, et al. Research on Network Intrusion Detection System Based on Distributed Data Mining Technology[J]. Journal of Wuhan University: Sci Ed, 2004(A01): 87-90.
[10] Meng Xiaoming. Technology and Methods of Invading Detection about Network Information Research on Intrusion Detection Technology and Method of Network Information[J]. Modern Library and Information Technology, 2004, 20(2): 63-65.

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16