A Network Intrusion Detection Algorithm Based on FSA Model

被引:0
|
作者
Wu, Fei [1 ]
Wu, Donghui [1 ]
Yang, Yingen [1 ]
机构
[1] Jangxi Normal Univ, Coll Comp Informat Engn, Nanchang 330022, Peoples R China
关键词
Intrusion detection; Finite state automaton; Protocol analysis technology; State transition diagrams; Session list;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present network attack technology is constantly updated, which bring network security workers huge challenges. In view of the fact that the existing intrusion detection technology is difficult to detect multi-step fragmentation attacks, distributed attacks and evading attacks, a network intrusion detection algorithm called FSA algorithm is proposed based on finite state automaton (FSA) model in this paper, and the key implementation technology is analyzed. The state transition diagram is used to illustrate the attack triggering and transfer process, and according to different protocol data, four different mechanisms are designed to detect invasion based on FSA. Experiments show that the algorithm not only can more precisely detect common attacks, but also can detect the unobvious attacks such as distributed and fragment attack very well, which can not be detected by other detection technologies. It is believe that it removes the limitations of the current intrusion detection technology and has an important research and practice value.
引用
收藏
页码:615 / 621
页数:7
相关论文
共 50 条
  • [1] Research of a network scan detection algorithm based on the FSA model
    Liu, Lijun
    Huai, Jinpeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (03): : 417 - 422
  • [2] An intrusion detection model based on genetic algorithm and neural network
    Xiong, Zhongyang
    Zhang, Yufang
    Cheng, Daijie
    Liu, Daoqun
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3416 - 3421
  • [3] Model of network intrusion detection system based on BP algorithm
    Wang, Y.
    Huang, G. X.
    Peng, D. G.
    ICIEA 2006: 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, PROCEEDINGS, 2006, : 659 - 662
  • [4] Model of network intrusion detection system based on BP algorithm
    Wang, Y.
    Huang, G. X.
    Peng, D. G.
    2006 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, 2006, : 139 - +
  • [5] Network intrusion detection model based on genetic ant colony algorithm
    Huang, Jianghao
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1150 - 1154
  • [6] An Effective Intrusion Detection System Based on the FSA-BGRU Hybrid Model
    Deng Zaihui
    Li Zihang
    Guo Jianzhong
    Gan Guangming
    Kong Dejin
    China Communications, 2025, 22 (02) : 188 - 198
  • [7] An Effective Intrusion Detection System Based on the FSA-BGRU Hybrid Model
    Deng Zaihui
    Li Zihang
    Guo Jianzhong
    Gan Guangming
    Kong Dejin
    CHINA COMMUNICATIONS, 2025, 22 (02) : 188 - 198
  • [8] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321
  • [9] A Clustering based Algorithm for Network Intrusion Detection
    Arya, K. V.
    Kumar, Hemant
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 193 - 196
  • [10] Research on intrusion detection algorithm in wireless network based on Bayes game model
    Chen, Hang
    Tao, Jun
    Tongxin Xuebao/Journal on Communications, 2010, 31 (02): : 107 - 112