A Network Intrusion Detection Algorithm Based on FSA Model

被引:0
作者
Wu, Fei [1 ]
Wu, Donghui [1 ]
Yang, Yingen [1 ]
机构
[1] Jangxi Normal Univ, Coll Comp Informat Engn, Nanchang 330022, Peoples R China
来源
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY | 2016年 / 60卷
关键词
Intrusion detection; Finite state automaton; Protocol analysis technology; State transition diagrams; Session list;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present network attack technology is constantly updated, which bring network security workers huge challenges. In view of the fact that the existing intrusion detection technology is difficult to detect multi-step fragmentation attacks, distributed attacks and evading attacks, a network intrusion detection algorithm called FSA algorithm is proposed based on finite state automaton (FSA) model in this paper, and the key implementation technology is analyzed. The state transition diagram is used to illustrate the attack triggering and transfer process, and according to different protocol data, four different mechanisms are designed to detect invasion based on FSA. Experiments show that the algorithm not only can more precisely detect common attacks, but also can detect the unobvious attacks such as distributed and fragment attack very well, which can not be detected by other detection technologies. It is believe that it removes the limitations of the current intrusion detection technology and has an important research and practice value.
引用
收藏
页码:615 / 621
页数:7
相关论文
共 50 条
[31]   Network Intrusion Detection Based on the Improved Artificial Fish Swarm Algorithm [J].
Wang, Guo ;
Dai, Dong .
JOURNAL OF COMPUTERS, 2013, 8 (11) :2990-2996
[32]   Research and Simulation of Network Intrusion Detection Algorithm Based on Fuzzy Classification [J].
Liu Chun .
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 6 :14-17
[33]   Network Intrusion Detection Based on PSO-Xgboost Model [J].
Jiang, Hui ;
He, Zheng ;
Ye, Gang ;
Zhang, Huyin .
IEEE ACCESS, 2020, 8 :58392-58401
[34]   Research on the Novel Computer Network Intrusion Detection Model based on Improved Particle Swarm Optimization Algorithm [J].
Fu, Juan ;
Hu, Hai ;
Wang, Leping .
2016 3RD INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2016), 2016, :138-143
[35]   DESNN Algorithm for Communication Network Intrusion Detection [J].
Fulai Liu ;
Jialiang Xu ;
Lijie Zhang ;
Ruiyan Du ;
Zhibo Su ;
Aiyi Zhang ;
Zhongyi Hu .
Wireless Personal Communications, 2022, 126 :1705-1720
[36]   Intrusion detection model for mobile communication network based on ANN [J].
Liu, PY ;
Liu, YG .
APPLICATIONS OF DIGITAL TECHNIQUES IN INDUSTRIAL DESIGN ENGINEERING-CAID&CD' 2005, 2005, :734-738
[37]   Improved RBF Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion [J].
Liu, Xuejun ;
Li, Kaili ;
Wang, Wenhui ;
Yan, Yong ;
Sha, Yun ;
Chen, Jianping ;
Qin, Jiaojiao .
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021, 16 (04) :1-16
[38]   A Model of Intrusion Detection Based on Data Mining in Campus Network [J].
Qi Bei ;
Dong Yun-feng .
NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, :317-+
[39]   A hierarchical network intrusion detection model based on unsupervised clustering [J].
Zhu, Yujie ;
Han, Dezhi ;
Yin, Xinming .
13TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2021, 2020, :22-29
[40]   DESNN Algorithm for Communication Network Intrusion Detection [J].
Liu, Fulai ;
Xu, Jialiang ;
Zhang, Lijie ;
Du, Ruiyan ;
Su, Zhibo ;
Zhang, Aiyi ;
Hu, Zhongyi .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) :1705-1720