Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data mining based invasion detection system with Oracle as core

An intrusion detection system and data mining technology, applied in the direction of digital data protection, electronic digital data processing, special data processing applications, etc., can solve the problems of adding and detecting data difficult to store and analyze, so as to improve flexibility, security, The effect of ensuring safety

Inactive Publication Date: 2016-04-06
JILIN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the design and implementation of high-quality application systems is facing huge challenges. Data conversion, model implementation and distributed detection all face complex engineering problems, such as detection data is difficult to store and analyze, and additional database facilities need to be added

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data mining based invasion detection system with Oracle as core
  • Data mining based invasion detection system with Oracle as core
  • Data mining based invasion detection system with Oracle as core

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] An intrusion detection system based on data mining with Oracle as the core, such as figure 1 As shown, it includes data sensor module, ETL module, data warehouse module, model generation and distribution module, intrusion detection module and data visualization module. The data sensor module includes network data sensor and host information sensor, which is used to collect various type of data flow information; the ETL module is used to preprocess the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an invasion detection system, in particular to a data mining based invasion detection system with Oracle as a core. The system comprises a data sensor module, an ETL module, a data warehouse module, a model generation and distribution module, an invasion detection module and a data visualization module. According to the system, data conversion and storage, model generation and release as well as invasion detection and alarming are all realized in an Oracle database, and real-time detection and offline detection are unified, so that the security and homogeneity of data and the system response time are ensured, the integration of model generation, model storage, model updating and detection alarming is realized, the problem in a system without a database as a core at present is solved, and the security of the whole network is improved.

Description

technical field [0001] The invention relates to an intrusion detection system, in particular to an intrusion detection system based on data mining with Oracle as the core. Background technique [0002] Network security has become an important part of social security. Network intrusion detection system (Intrusion Detection System, hereinafter referred to as IDS) plays a key role in protecting government and enterprise information security. Various network attacks occur frequently in the world today. New Attack patterns emerge in endlessly. A survey conducted by B2B International and Kaspersky Lab in 2013 showed that in the past year, 91% of the surveyed enterprises had suffered at least one cyber attack, and 9% of the enterprises had suffered from well-designed targeted attacks. , There have been guerrilla attacks represented by Icfog attacks. Society's requirements for network intrusion detection systems continue to increase. [0003] In recent years, IDS based on data min...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F17/30
CPCG06F21/6227G06F16/211G06F16/254
Inventor 张帆冉祥金尚燕京魏昌兴张丰
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products