The simulation and analysis of the large-scale intrusion detection model in shuffle networks

被引:0
|
作者
Likewei [1 ]
机构
[1] Tianjin Vocat Inst, Network Ctr, Tianjin 300410, Peoples R China
关键词
Misuse behavior; shuffle network; intrusion detection;
D O I
10.4028/www.scientific.net/AMM.556-562.2878
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are some issues for the shuffle network intrusion detection, such as high loss detection rates and time-consuming procedures. This paper proposes a shuffle network intrusion detection method fusing the misuse behavior analysis and analyzes the network misuse behavior procedures. According to the damaged data flow balance features by network misuse behavior, the paper applies the hypothesis test in probability theory to evaluate whether the confidence interval excesses 0. If the confidence interval does not contain zero, it indicates the presence of feed-forward network intrusion; otherwise, there is no feed-forward network intrusion. The experimental results show that this method can effectively solve the multi-packet collaborative intrusion problems. Compared to traditional methods, the test speed and accuracy of the method is significantly improved.
引用
收藏
页码:2878 / 2881
页数:4
相关论文
共 50 条
  • [1] A Framework for Large-Scale Simulation of Collaborative Intrusion Detection Systems
    Fisch, Dominik
    Hofmann, Alexander
    Hornik, Valentin
    Dedinski, Ivan
    Sick, Bernhard
    2008 IEEE CONFERENCE ON SOFT COMPUTING IN INDUSTRIAL APPLICATIONS SMCIA/08, 2009, : 125 - 130
  • [2] Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks
    Chen, Changlong
    Song, Min
    Hsieh, George
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 711 - +
  • [3] PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks
    Javed Y.
    Khayat M.A.
    Elghariani A.A.
    Ghafoor A.
    IEEE Transactions on Dependable and Secure Computing, 2023, 20 (06) : 5070 - 5086
  • [4] Intrusion and misuse detection in large-scale systems
    Erbacher, RF
    Walker, KL
    Frincke, DA
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2002, 22 (01) : 38 - 47
  • [5] Intrusion and misuse detection in large-scale systems
    Erbacher, Robert F.
    Walker, Kenneth L.
    Frincke, Deborah A.
    Pollution Engineering, 2002, 34 (02) : 40 - 48
  • [6] Analysis, simulation and measurement in large-scale packet networks
    Mondragon, R.
    Moore, A.
    Pitts, J.
    Schormans, J.
    IET COMMUNICATIONS, 2009, 3 (06) : 887 - 905
  • [7] A game theoretic model for dynamic configuration of large-scale intrusion detection signatures
    Xaiver Jerald Punithan
    Jong-Deok Kim
    Dongseok Kim
    Yoon-Ho Choi
    Multimedia Tools and Applications, 2016, 75 : 15461 - 15477
  • [8] A game theoretic model for dynamic configuration of large-scale intrusion detection signatures
    Punithan, Xaiver Jerald
    Kim, Jong-Deok
    Kim, Dongseok
    Choi, Yoon-Ho
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 15461 - 15477
  • [9] A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks
    Puzis, Rami
    Tubi, Meytal
    Elovici, Yuval
    Glezer, Chanan
    Dolev, Shlomi
    ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, 2011, 22 (01):
  • [10] The architecture of the large-scale distributed intrusion detection system
    Chu, YG
    Li, J
    Yang, YX
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 130 - 132