图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v79.i12.30
pages 1055-1062

REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM

A. L. Zhou
Yantai Vocational College, 2-20, Dongxing Street, Zhifu District, Yantai, Shandong 264000, China

ABSTRACT

Intrusion detection is very important for network security. In this study, the structure and design of the Snort system were introduced briefly, and then the ability of data acquisition was improved by a third-party interface. In the part of intrusion detection, the pattern matching algorithm was improved to improve the detection effect of the system. The experimental results showed that the data packet capture ability of the improved system was significantly improved, and the packet loss rate was 97.41% lower than that of the ordinary system; in the intrusion detection, the detection efficiency was kept at 75 M/s, which was significantly higher than other algorithms; for 20 attack traffic, the improved system could realize all alarms, and the maximum response time was only 0.3 s. The experimental results show that the improved Snort system is effective in intrusion prevention and it is worth to be widely used in practice.

REFERENCES

  1. Jallad, K.A., Aljnidi, M., and Desouki, M.S., (2019) Big data analysis and distributed deep learning for next-generation intrusion detection system optimization, J. Big. Data., 6(1), pp.88.

  2. Ethala, K., Sheshadri, R., and Chakkaravarthy, S.S., (2015) WIDS Real-Time Intrusion Detection System Using Entrophical Approach, Adv. Intell. Syst. Comput., 324, pp.73-79.

  3. Abusitta, A., Bellaiche, M., and Dagenais, M., (2019) Multi-cloud cooperative intrusion detection system: trust and fairness assurance, Ann. Telecommun., 74(4), pp.1-17.

  4. Singh, O., Singh, J., and Singh, R., (2017) Multi-level trust-based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET, Cluster. Comput., pp.1-13.

  5. Peng, K., Leung, V.C.M., and Huang, Q., (2018) Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System over Big Data, IEEE Access., 6, pp.11897-11906.

  6. Al-Yaseen, W.L., Othman, Z.A., and Nazri, M.Z.A., (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system, Expert. Syst. Appl., 67, pp.296-303.

  7. Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L. et al., (2017) Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System, Tetrahedron. Lett., 42(39), pp.6865-6867.

  8. Shah, S.A.R., Issac, B., and Jacob, S.M., (2018) Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning, Int J. Comput. Intell. Appl., 4, pp.1850007.

  9. Khamphakdee, N., Benjamas, N., and Saiyod, S., (2015) Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining, J. ICTRes. Appl., 8(3), pp.234-250.

  10. Wang, Y., Yu, G., and Zhang, J., (2013) Combination of PF_RING with NAPI packet capture performance optimization and simulation, Comput. Eng. Appl., 49(8), pp.81-84.

  11. Jiang, Y.P., Tian, Y.X., and Zhao, J.W., (2015) An Improved Pattern Matching Algorithm Based on BM, B. Sci. Tech., pp.599-603.

  12. Xu, X.N., Li, A.P., and Zhu, J.X., (2013) DWMH: An Improved Algorithm Based on WM for Large-Scale Pattern Set, Adv. Mater. Res., 765-767, pp.963-967.

  13. Navarro, G., Puglisi, S.J., and Siren, J., (2014) Document Retrieval on Repetitive Collections, Lect. Notes. Comput. Sc., 8737, pp.725-736.

  14. Xiang, Q.Q., Lv, Z., and Qiao, P.L., (2013) An Improvement Measure to AC-BM Pattern Matching Algorithm in Intrusion Defense System, Appl. Mech. Mater., 344, pp.234-237.

  15. Ali, M.Q., Al-Shaer, E., and Samak, T., (2017) Firewall Policy Reconnaissance: Techniques and Analysis, IEEE T. Inf. Foren. Sec., 9(2), pp.296-308.

  16. Mahmood, G.S., Huang, D.J., and Jaleel, B.A., (2017) Data Security Protection in Cloud Using Encryption and Authentication, J. Comput. Theor. Nanos., 14(4), pp.1801-1804.

  17. Wachter, S., (2017) Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR, Comput. Law. Secur. Rep., 34(3), pp.436-449.

  18. Lee, K.H. and Park, Y.B., (2017) A study of environment-adaptive intrusion detection system, Lect. Notes. Electr. Eng., pp.625-630.


Articles with similar content:

DATA INFORMATION SECURITY OF COMMUNICATION NETWORK BASED ON EDGE COMPUTING TECHNOLOGY AND BP NEURAL NETWORK
Telecommunications and Radio Engineering, Vol.78, 2019, issue 20
X.L. Liu
A COMPUTER NETWORK INTRUSION DETECTION TECHNOLOGY BASED ON IMPROVED NEURAL NETWORK ALGORITHM
Telecommunications and Radio Engineering, Vol.79, 2020, issue 7
R. X. Liu
Off-Line Signature Recognition Using Feature Extraction and Multilayer Neural Networks
Telecommunications and Radio Engineering, Vol.56, 2001, issue 1
Karina Toscano-Medina, Gabriel Sanchez-Perez, Mariko Nakano Miyatake, Hector Manuel Perez-Meana
APPLICATION OF IMAGE OVERLAPPING TECHNIQUE TO MULTI-PLANE VELOCITY MEASUREMENTS OF FLOWS IN A POROUS-LIKE CHANNEL
Journal of Porous Media, Vol.22, 2019, issue 3
Haoli Wang, Ming Xu
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering, Vol.69, 2010, issue 7
J. Sisniega-Gonzalez, Mariko Nakano-Miyatake, E. Aguirre-Anaya, Hector Manuel Perez-Meana