Advertisement

The Research and Contrast of the Hybrid Intrusion Detection

Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 115)

Abstract

This paper firstly does some analysis on the system based on data mining and explains the preliminary concept and the characteristics of the data mining, then it analyses the system based on ummune theory According to the principle and the characteristic of the immune theory,we put it into the intrusion detection system and propose the instrusion system model which is mixed with the immunology. At last,this paoer introduces the typical hybird intrusion detection system and the new hybird intrusion detection system based on the immune algorithm.

Keywords

Data mining Mixed intrusion detection Immune algorithm 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jiang, Z., Wu, T.: The Information Security Principles and Techniques. China Railway Publishing House (May 2009)Google Scholar
  2. 2.
    Wu, C., Zhang, C.: The information Security based on. Wuhan University Press (January 2007)Google Scholar
  3. 3.
    Xin, Y., Xiao, M.: The research and implementation on snort based on hybrid intrusion detection system. In: Proceedings of the Eighth International Conference on Machine Learning and Cybernetics (December2009)Google Scholar
  4. 4.
    Chen, W., Zhou, J.: The snort lightweight intrusion detection system Raiders. Beijing University Press (July 2009)Google Scholar
  5. 5.
    Yong, Q., Shao, Y.: Intrusion detection. Xi dian University Press (August 2009)Google Scholar
  6. 6.
    Cui, M.: Based on the principle of mixed immune intrusion detection system. Nanjing University of Information Science, Nanjing (2007)Google Scholar
  7. 7.
    Sheng, X.: Based on Immune Intrusion Detection System. Nanjing University of Aeronautics and Astronautics, Nanjing (2008)Google Scholar
  8. 8.
    Ning, P., Reeves, D., Cu, Y.: Correlating alerts using Prerequisites of intrusions.Technical Report TR-2001-13, North Carolina State University, Department of ComPuter Science, 25 (1):55-63 (December 2005)Google Scholar
  9. 9.
    Zhao, H.: Network Intrusion Detection. Sichuan University 24(12), 13–15 (2003)Google Scholar
  10. 10.
    Yang, X., Liu, Z.: Comparison of Intrusion Detection System. Computer Engineering 30(6), 37–38 (2004)MATHGoogle Scholar
  11. 11.
    Bai, Y., Kobayashi, H.: Intrusion Detection Systems: Technology and Development. In: Proceedings of the 17th International Conferenee on Advaneed Information Networking and Applieations, Lyon, pp. 607–610 (2003)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.North China Electric Power University he bei sheng bao ding shi hua dian luxin xiangChina

Personalised recommendations