In the last couple of years, the computer frameworks have become more vulnerable to external attacks. The PC security has become the prime cause of concern for every organization. To achieve this objective Intrusion D...
详细信息
In the last couple of years, the computer frameworks have become more vulnerable to external attacks. The PC security has become the prime cause of concern for every organization. To achieve this objective Intrusion Detection System (IDS) in self-configurable networks has played a vital role in the last few decades to guard LANs. In this work, an IDS in self-configurable networks is deployed based on Bioinspired Immune System. IDS in self-configurable networks are accustomed to monitor data and network activity and alert when any suspicious activity observed security heads are alerted. A vital and common application space for versatile frameworks swarm-based is that of PC security. A PC security framework ought to protect a machine or accumulation of machines from unapproved gatecrashers. The framework seems to be capable of counteracting against external activity. Also it is comparable in usefulness to secure framework shielding from intrusion by external threats like in case of attacking microorganisms. A counterfeit insusceptible framework is a PC programming framework that mirrors a few sections of the conduct of the human resistant framework to shield PC systems from infections and comparable digital assaults. This paper demonstrates the need of a novice substring seeks calculation based on bio-roused calculations. Tests are required to create system for Network Intrusion detection that aids in securing a machine or clusters of machines from unapproved intruders. In this paper IDS in self-configurable networks is implemented by using Bio-inspired Immune System and kmp algorithm as a model IDS.
String matching is a special kind of pattern recognition problem, which finds all occurrences of a given pattern string in a given text string. The technology of two-dimensional string matching is applied broadly ...
详细信息
String matching is a special kind of pattern recognition problem, which finds all occurrences of a given pattern string in a given text string. The technology of two-dimensional string matching is applied broadly in many information processing domains. A good two-dimensional string matching algorithm can effectively enhance the searching speed. In this paper, the kmp algorithm, Rabin-Karp algorithm and their combinatorial are presented and compared, by a number of tests at diverse data scales, to validate the efficiency of these three algorithms.
The most way to realize is the tring match search cycle or through a third party software package in common embedded terminal,in this paper presents a new analysis and the search of string matrix algorithm,its impleme...
详细信息
The most way to realize is the tring match search cycle or through a third party software package in common embedded terminal,in this paper presents a new analysis and the search of string matrix algorithm,its implementation is easy,and its search performance has greater improvement compared with ordinary ways.
Network performance monitor has now become a central issue in network application and operation optimization. This article describes a detail introduction of data processing and analyzing model in passive network perf...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
Network performance monitor has now become a central issue in network application and operation optimization. This article describes a detail introduction of data processing and analyzing model in passive network performance monitor system. Pretreatment technique is used for eliminating impulse point and zero point. kmp algorithm is used for string matching. The data processing and analyzing technique is a bran-new idea. Experiment results indicate this model is effective and of a definite practicability.
The pattern matching algorithm is one of the core algorithms used in the intrusion detection system. The classical snort system has completed the matching for characteristic string of intrusion through the BM single-p...
详细信息
ISBN:
(纸本)9781467376839
The pattern matching algorithm is one of the core algorithms used in the intrusion detection system. The classical snort system has completed the matching for characteristic string of intrusion through the BM single-pattern algorithm. In actual application, the Sunday algorithm has a efficiency higher than the BM algorithm. In this text, an extra jump array was added to the jump arrays of the Sunday algorithm. When it appears unequal characters during the procedure of matching, make twice jumps successively and help decrease the redundant matching to a greater extent. This text describes how to realize twice-jumps algorithm and its analysis and experimental verification show the accuracy and efficiency of the improved algorithm compared with the Sunday algorithm.
暂无评论