The Research and Contrast of the Hybrid Intrusion Detection
This paper firstly does some analysis on the system based on data mining and explains the preliminary concept and the characteristics of the data mining, then it analyses the system based on ummune theory According to the principle and the characteristic of the immune theory,we put it into the intrusion detection system and propose the instrusion system model which is mixed with the immunology. At last,this paoer introduces the typical hybird intrusion detection system and the new hybird intrusion detection system based on the immune algorithm.
KeywordsData mining Mixed intrusion detection Immune algorithm
Unable to display preview. Download preview PDF.
- 1.Jiang, Z., Wu, T.: The Information Security Principles and Techniques. China Railway Publishing House (May 2009)Google Scholar
- 2.Wu, C., Zhang, C.: The information Security based on. Wuhan University Press (January 2007)Google Scholar
- 3.Xin, Y., Xiao, M.: The research and implementation on snort based on hybrid intrusion detection system. In: Proceedings of the Eighth International Conference on Machine Learning and Cybernetics (December2009)Google Scholar
- 4.Chen, W., Zhou, J.: The snort lightweight intrusion detection system Raiders. Beijing University Press (July 2009)Google Scholar
- 5.Yong, Q., Shao, Y.: Intrusion detection. Xi dian University Press (August 2009)Google Scholar
- 6.Cui, M.: Based on the principle of mixed immune intrusion detection system. Nanjing University of Information Science, Nanjing (2007)Google Scholar
- 7.Sheng, X.: Based on Immune Intrusion Detection System. Nanjing University of Aeronautics and Astronautics, Nanjing (2008)Google Scholar
- 8.Ning, P., Reeves, D., Cu, Y.: Correlating alerts using Prerequisites of intrusions.Technical Report TR-2001-13, North Carolina State University, Department of ComPuter Science, 25 (1):55-63 (December 2005)Google Scholar
- 9.Zhao, H.: Network Intrusion Detection. Sichuan University 24(12), 13–15 (2003)Google Scholar
- 11.Bai, Y., Kobayashi, H.: Intrusion Detection Systems: Technology and Development. In: Proceedings of the 17th International Conferenee on Advaneed Information Networking and Applieations, Lyon, pp. 607–610 (2003)Google Scholar