Research and Application on Intrusion Detection Technology Based on Improved BM Algorithm

Article Preview

Abstract:

Based on the traditional intrusion detection technology in BM pattern matching algorithm, solved the original algorithm in the detection of matching data string search inefficiency. Improved BM algorithm in combination with the advantages of traditional algorithm, overcomes the shortcoming of the traditional BM algorithm, reduces the mobile number in the pattern matching process in the pattern string, greatly improve the matching efficiency. Analysis and experiments show that, the efficiency of improved algorithm has been significantly improved.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1025-1027

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] VERWORD T,HUNT R. Intrusion detection techniques and approaches[J]. Computer Communication,2002,25(15): 1356.

Google Scholar

[2] LANE T. Machine learning techniques for the computer security domain of anomaly detection[D]. Purdue University,(2000).

Google Scholar

[3] BARFORD P,HIINE J,PLONKA D,et al. A signal analysis of network traffic anomalies[J]. Internet Measurement Workshop,2002,7: 1-82.

Google Scholar

[4] YE N, LI Xiang Yatig,CHEN Qiang. Probabilistic techniques for intrusion detection based on computer audit data[J]. Man and Cybernetics,Part A,IEEE Transactions on 2001: 31(4): 266-274.

DOI: 10.1109/3468.935043

Google Scholar

[5] OH S H,LEE W. A clustering based anomaly intrusion detection for a host computer[J]. IEICE Transactions on In. formation and Systems,2004,E87-D(8): 2086-(2094).

Google Scholar