首页> 外文期刊>Information and Knowledge Management >Enhancing the Performance of Intrusion Detection System by Minimizing the False Alarm Detection Using Fuzzy Logic
【24h】

Enhancing the Performance of Intrusion Detection System by Minimizing the False Alarm Detection Using Fuzzy Logic

机译:通过使用模糊逻辑最大限度地减少误报检测,提高入侵检测系统的性能

获取原文
       

摘要

According to the information technology and regarding to the revolutions of the computer worlds, this world has got important information and files that have to be secured from different types of attacks that corrupt and distort them. Thus, many algorithms have turned up to increase the level of security and to detect all types of such attacks. Furthermore, many algorithms such as Message Digest algorithm 5 (MD5) and Secure Hash Algorithm 1 (SHA-1) tend to detect whether the file is attacked, corrupt and distorted or not. In addition, there should be more algorithms to detect the range of harm which the files are exposed to in order to make sure we can use these files after they have been affected by such attacks. To be clear, MD5 and SHA-1 consider the file corrupt once it is attacked; regardless the rate of change .Therefore, the aim of this paper is to use an algorithm that allows certain rate of change according to the user, which is SSdeep algorithm. Meanwhile, it gives the rates of change depending on the importance of each file. Moreover, each rate of change determines whether we can make use of the file or not. I made assumption in creating four folders, each contains multiple files with minimum predefined allowed of similarity. Then graphical user interface is created to utilize the SSdeep algorithm and to permit user to define the allowed similarity on each folder or file depending on impotency of it. After applying the algorithm, I got results showing the benefits of such algorithm to make use of these attacked or modified files.
机译:根据信息技术并考虑到计算机世界的革命,该世界已经获得了重要的信息和文件,这些信息和文件必须受到保护,以免受到破坏和扭曲它们的各种类型的攻击。因此,出现了许多算法来提高安全级别并检测所有类型的此类攻击。此外,许多算法(例如,消息摘要算法5(MD5)和安全哈希算法1(SHA-1))倾向于检测文件是否受到攻击,损坏和失真。此外,应该有更多的算法来检测文件受到的危害范围,以确保在受到此类攻击影响后,我们可以使用这些文件。需要明确的是,MD5和SHA-1认为文件一旦受到攻击便已损坏;因此,本文的目的是使用一种根据用户允许一定变化率的算法,即SSdeep算法。同时,它根据每个文件的重要性给出变化率。而且,每个更改的速度决定了我们是否可以使用该文件。我假设创建了四个文件夹,每个文件夹包含多个文件,这些文件的相似性最低。然后创建图形用户界面,以利用SSdeep算法并允许用户根据其无用性在每个文件夹或文件上定义允许的相似性。应用该算法后,我得到的结果表明了该算法利用这些被攻击或修改的文件的好处。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号