Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion prevention system based on multi-mobile agents and data mining technology

A data mining and mobile agent technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to prevent, high false alarm rate, single security detection method, etc., and achieve the effect of enhancing intelligence, improving operating efficiency and performance

Inactive Publication Date: 2010-09-15
SHANGHAI DIANJI UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The focus is on network monitoring and auditing and tracking. When abnormalities are found, only reporting cannot prevent them, and can only be protected by linkage with security devices such as firewalls
At present, there are serious defects: one is the network defect, using a switch to replace the HUB that can share the monitoring will bring trouble to the IDS network monitoring, and carefully constructing and sending data packets under a complex network can also bypass the IDS monitoring
Second, there is a large amount of false positives and false negatives, and there are constant alarms
The traditional network-based intrusion prevention system (Network Intrusion Prevention System, NIPS) has a single security detection method, high false alarm rate, many false alarm rates, and false negatives, which seriously affect the key technologies and security of computer network security defense and detection. defensive performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion prevention system based on multi-mobile agents and data mining technology
  • Network intrusion prevention system based on multi-mobile agents and data mining technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to better understand the technical content of the present invention, specific embodiments are given and described as follows in conjunction with the accompanying drawings.

[0024] Please refer to figure 1 , figure 1 Shown is a schematic diagram of a network intrusion prevention system based on multiple mobile agents and data mining technology in a preferred embodiment of the present invention.

[0025] The present invention proposes a network intrusion prevention system based on multiple mobile agents and data mining technology, including: mobile agent function module 100, data mining function module 200, intelligent module 300, detector 400, linkage module 500 and protection audit trail agent module 600, of which,

[0026] The mobile agent function module 100 includes a mobile agent database 110 and a feature rule library 120, which are respectively connected to the detector 400;

[0027] The data mining function module 200 includes a data mining database ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network intrusion prevention system based on multi-mobile agents and a data mining technology, comprising a mobile agent function module, a data mining function module, an intelligent module, a detector, a linkage module and a guard audit trail agent module, wherein, the mobile agent function module is composed of a mobile agent database and a characteristic rule library which are connected with the detector respectively; the data mining function module comprises a data mining database and a self-adaptive model generator which are mutually connected, and the data mining database is connected with the characteristic rule library; the intelligent module comprises an expert system and a safety knowledge base which are mutually connected, the expert system is connected with the detector and the data mining database and the safety knowledge base is connected with the self-adaptive model generator; and the detector is connected with the linkage module, and the guard audit trail agent module is connected with the linkage module and the expert system. The network intrusion prevention system can extract and identify abnormal access information in real time and improve safety, reliability and defensive capability of a network.

Description

technical field [0001] The present invention relates to the technical field of computer network information security, and in particular to a network intrusion defense system based on multi-mobile agents and data mining technology, which is mainly applied to the key technologies of computer network security defense systems, and can effectively solve network security missed detection and The problem of false alarms can be solved, and the accuracy of network access detection, identification and decision-making and overall intelligent defense capabilities can be further improved. Background technique [0002] The Intrusion Detection System (IDS) used at home and abroad mainly analyzes, monitors, detects and identifies unauthorized or abnormal phenomena in the system through network data packets. The focus is on network monitoring and auditing and tracking. When abnormalities are found, only reporting cannot prevent them. They can only be protected by linkage with security device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 贾铁军
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products