Design of intrusion detection system oriented to computer network security

被引:0
作者
Lou, Xiao [1 ]
机构
[1] Zhejiang Univ Technol, Zhijiang Coll, Coll Comp Sci & Technol, Hangzhou 312030, Zhejiang, Peoples R China
来源
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017) | 2017年 / 141卷
关键词
Intrusion Detection; Network Security; Security Analysis; CLOUD;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of computer network, the protection of network information from various attacks is becoming more and more serious, and has become the basic purpose of network security. However, because of diversity and openness of computer network connection with the terminal and the network distribution of the connectivity characteristics of the system, leading to the computer network vulnerable to hackers, malicious software attacks and other misconduct, network security has become a key factor restricting the development of the network. Therefore, it is necessary to carry out the comprehensive research of intrusion detection.
引用
收藏
页码:258 / 262
页数:5
相关论文
共 6 条
[1]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[2]  
Hoque M.S., 2012, INT J NETWORK SECURI
[3]   Game Theory Meets Network Security and Privacy [J].
Manshaei, Mohammad Hossein ;
Zhu, Quanyan ;
Alpcan, Tansu ;
Basar, Tamer ;
Hubaux, Jean-Pierre .
ACM COMPUTING SURVEYS, 2013, 45 (03)
[4]   A survey of intrusion detection techniques in Cloud [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Hiren ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :42-57
[5]   A Survey of Visualization Systems for Network Security [J].
Shiravi, Hadi ;
Shiravi, Ali ;
Ghorbani, Ali A. .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2012, 18 (08) :1313-1329
[6]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11