An Intrusion Detection Method Study under the Environment of IPv6

Article Preview

Abstract:

The intrusion detection under the environment of IPv6 is an important security technology along with firewall in system security defense system, which can be used for real-time detection and monitoring of the system in the whole process of system invasion. This paper puts forward an intrusion detection system under IPv6 platform based on intrusion detection feature attribute reduction by using pattern matching, so as to expand the range of application and user group of the security products. By the analysis and comparison of various pattern matching algorithms, the new algorithm realizes the intrusion feature module matching under IPv6, and make detection system be of high efficiency. Later experiments have proved this view.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 760-762)

Pages:

2238-2243

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ivan Goethals, Kristiaan Pelckmans, Johan A.K. Suykens, Bart De Moor. Identification of MIMO Hammerstein models using least squares support vector machines[J]. Automatica, 2005, 41(7): 1263-1272.

DOI: 10.1016/j.automatica.2005.02.002

Google Scholar

[8] Everthon Silva Fonseca, Rodrigo Capobianco Guido, Paulo Rogério Scalassara, Carlos Dias Maciel, José Carlos Pereira. Wavelet time-frequency analysis and least squares support vector machines for the identification of voice disorders[J]. Computers in Biology and Medicine, 2007, 37(4): 571-578.

DOI: 10.1016/j.compbiomed.2006.08.008

Google Scholar

[3] Mohammad Saniee Abadeh, Jafar Habibi, Zeynab Barzegar, Muna Sergi. A parallel genetic local search algorithm for intrusion detection in computer networks[J]. Engineering Applications of Artificial Intelligence, 2007, 20(8): 1058-1069.

DOI: 10.1016/j.engappai.2007.02.007

Google Scholar

[4] Roberto Perdisci, Giorgio Giacinto, Fabio Roli. Alarm clustering for intrusion detection systems in computer networks[J]. Engineering Applications of Artificial Intelligence, 2006, 19(4): 429-438.

DOI: 10.1016/j.engappai.2006.01.003

Google Scholar

[5] apnik VN. The Nature of Statistical LearningTheory[M]. New York: Spring-Verlag, (1995).

Google Scholar