预览加载中,请您耐心等待几秒...
1/4
2/4
3/4
4/4

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

基于SVM技术的入侵检测方式 Abstract: Withtherapiddevelopmentofcomputertechnology,theproblemofnetworksecurityhasattractedmoreandmoreattention.Theintrusiondetectiontechnologyhasbecomethemostimportantpartofnetworksecurity.Thispaperintroducesthesupportvectormachine(SVM)technology,analyzesitsadvantagesanddisadvantagesinintrusiondetection,andproposesamethodofintrusiondetectionbasedonSVM.TheexperimentshowsthatSVMhasexcellentperformanceinintrusiondetection,andthemethodproposedinthispaperhashighaccuracyandgoodgeneralizationability. Introduction: Intrusiondetectiontechnologyisanimportantpartofnetworksecurity.Intrusiondetectionmeansthatbyanalyzingthenetworktraffic,thesystemcanautomaticallyidentifythebehaviorthatmaythreatenthesecurityofthesystemandtakecorrespondingmeasurestoprotectthesystem.Withthedevelopmentofnetworktechnology,thenumberofcomputervirusesandnetworkattackshasalsoincreased.Therefore,theresearchonintrusiondetectiontechnologyhasbecomeincreasinglyimportant. SVM(SupportVectorMachine)isamachinelearningalgorithmthathasbeenwidelyusedinmanyfieldssuchaspatternrecognition,dataclassification,anddataanalysis.SVMhastheadvantagesofgoodgeneralizationability,fastcalculationspeed,andhighaccuracy.Inthefieldofintrusiondetection,SVMhasalsobeenwidelyused.BasedontheadvantagesofSVM,thispaperproposesamodelofintrusiondetectionbasedonSVM. IntrusionDetectionSystem: Intrusiondetectionsystem(IDS)isasystemthatmonitorsnetworktrafficandidentifiespotentialintrusionbehavior.Thebasicarchitectureofanintrusiondetectionsystemisdividedintothreeparts:dataacquisition,dataanalysis,andresponse. Dataacquisition:Theacquisitionofdataincludesnetworkdataandsystemlogdata.Networkdatareferstothedatacollectedfromthenetworktraffic,whichincludespacketheaderinformation,packetpayloads,andotherrelevantinformation.Systemlogdatareferstotheloginformationgeneratedbythesystem,whichincludessystemloginrecords,systemconfigurationinformation,andotherrelevantinformation. Dataanalysis:Afteracquiringthedata,thenextstepistoanalyzethedata.Thispr