Analogue biological immunological mechanism invasion detecting method

A technology of intrusion detection and biological immunity, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of uncertainty, difficulty in providing statistical models, ambiguity, etc., and achieve the effect of strong robustness

Inactive Publication Date: 2006-05-24
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the development of computer systems, the emergence of multiple operating systems, the development of computer networks, especially the application of distributed systems, etc., the flexibility, diversity, complexity and h

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Analogue biological immunological mechanism invasion detecting method
  • Analogue biological immunological mechanism invasion detecting method
  • Analogue biological immunological mechanism invasion detecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The detection method is an intelligent method, such as figure 1 As shown, its data analysis is relatively independent from the underlying data source acquisition layer and the upper application system presentation layer, and can be applied to abnormal detection of various data sources, including host audit data sources and network packet data sources.

[0034] The invention includes the system architecture of the intrusion detection system, the specific functions of each component, the workflow of the intrusion detection, and the data collection, pattern expression, feature extraction and matching rules in the detection algorithm adopted.

[0035] The general architecture of an intrusion detection system is figure 1 As shown, it can be roughly divided into three layers: data source acquisition at the bottom layer, data analysis at the middle layer, and man-machine interface and response at the upper layer. There are two main sources of underlying data sources: network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is in use for intelligentized analyzing data source collected in intrusion detection system. The invention includes methods of anomaly detection under host condition and network condition. The method includes following steps: first obtaining data source to be detected including host audit data and data of network data packet, characters of which are formatted as binary element string character string in length L; then, based on data source under normal condition, set of tester is generated; finally, using the set of tester carries out anomaly detection for real data. Based on host audit data and data of network data packet, the invention implements overall process: data acquisition, feature extraction and intrusion detection. Features are: system in distributed, lightweight level, and having fine characteristics of biological immune system: self-organization, diversity and self-adapting.

Description

technical field [0001] The invention is a computer security solution similar to biological immune mechanism. This solution is mainly used to solve the intelligent analysis of collected data in the intrusion detection system, including the analysis and processing method of host audit data and network data packets, which belongs to the cross-technical field of computer software security technology and artificial intelligence technology. Background technique [0002] Computer system security has always been the focus of computer experts. The traditional computer security protection system relies on three prerequisites: (1), there must be a completely correct system implementation strategy; (2), the correct implementation of the system under the guidance of this implementation strategy; (3), the system must must be properly configured. These premises are completely correct in theory, but it is almost impossible in the actual application process, and no one can guarantee that a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
Inventor 王汝传陈云芳杨庚
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products