首页> 外文OA文献 >Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm
【2h】

Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm

机译:基于网络入侵检测系统(NIDS)和ID3算法的网络入侵防御系统(NIPS)

摘要

Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.
机译:网络安全已在研究和工业界引起了广泛关注。由于网络入侵的威胁越来越大,防火墙已成为安全策略的重要元素。防火墙的性能高度依赖于规则数量,因为更多的规则会导致下坡性能可以逐步提高。可以允许或拒绝防火墙访问传入和传出局域网(LAN)的网络数据包,但防火墙无法检测到入侵。区分入侵网络数据包或正常数据是非常困难的,而且需要花费大量时间。必须事先审查所有网络流量。在本研究中,一种新方法可以自动确定可以确定网络数据包为入侵或正常的规则。这些规则作为预防措施实施在防火墙中,如果存在与这些规则匹配的网络数据包,则作为预防措施网络数据包将被丢弃。这称为网络入侵防御系统(NIPS)。这些规则是根据n网络入侵检测系统(NIDS)和迭代二分法3(ID3)算法决策树分类器,作为数据训练,是入侵网络数据包和来自先前网络流量的正常网络数据包。实验成功,可以生成规则然后实施到防火墙并自动丢弃入侵网络数据包。此外,这种方法可以最大程度地减少防火墙中的规则数量。

著录项

  • 作者

    Syurahbil A;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号