Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion detection system and method based on data mining

A network intrusion detection and data mining technology, applied in the field of network security, can solve the problems that the protocol analysis technology does not have the audit function, cannot process massive data in time, and limits the application of the protocol analysis technology, so as to improve the detection speed and detection accuracy , Reduce system false positives and false positives, and prevent distributed attacks

Inactive Publication Date: 2010-07-28
JINAN UNIVERSITY
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, with the emergence of high-speed network technologies such as ATM, Gigabit Ethernet, and G-bit fiber optic networks, the amount of data and information in the network has increased exponentially, causing more and more problems with the above-mentioned simple protocol analysis technology. , including: all data packets must be restored and interpreted, and the massive data generated in the network cannot be processed in a timely manner, resulting in a large number of packet loss, continuous occupation of system resources and low efficiency, and the protocol analysis technology can only target a single Fast, real-time attack detection of data packets, but powerless against intentional attacks and large-scale distributed coordinated attacks. In addition, pure protocol analysis technology does not have auditing functions, which also limits the application of protocol analysis technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection system and method based on data mining
  • Network intrusion detection system and method based on data mining
  • Network intrusion detection system and method based on data mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] Such as figure 2 As shown, a network intrusion detection system based on data mining includes:

[0056] The data packet capture module is used to capture data packets in the network, classify the captured data packets by type, discard non-compliant data packets and generate discarded data packet report information to send to the alarm response module, and then classify and discard processing The final data packet is sent to the data packet analysis module;

[0057] The data packet analysis module is used to analyze the datagram format of the data packet sent by the data packet capture module, and judge whether the current data packet is a complete data packet, and if so, directly send the complete data packet to the data mining module, otherwise call the fragment The reassembly module reassembles the fragmented data packets;

[0058] The fragment reassembly module is used to reassemble the fragmented data packets, send the reassembled and restored complete data packe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network intrusion detection system and a method based on data mining. The system comprises a data packet capturing module, a data packet analyzing module, a fragment recombination module, a data mining module, a protocol analyzing module, an alarm responding module and a rule analyzing module. The invention effectively combines data mining technology and protocol analyzing technology, thereby improving the accuracy and the reliability of detection; and simultaneously, the data mining technology is used for processing mass data, thereby realizing real-time response.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data mining-based network intrusion detection system and method. Background technique [0002] With the rapid development of the network, informatization has penetrated into all aspects of daily life. However, in the process of this rapid development, accompanied by the rapid increase of hacker attacks and the complexity and diversification of attack methods, network security problems have emerged one after another, which has seriously threatened the information platform we rely on for survival. The current simple firewall technology can no longer prevent network intrusion, and the intrusion detection system has been widely used as the main network security technology at present. As a proactive security protection technology, intrusion detection can not only detect intrusions from outside the network, but also supervise the activities of users inside the network, prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/56H04L47/43
Inventor 姚国祥罗伟其官全龙尚华益
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products