Network Attack Signatures Based on Sequence Alignment Algorithms for Data Extraction

来源 :2014年国际计算机科学与软件工程学术会议 | 被引量 : 0次 | 上传用户:scotty_zhao
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Network security is a major issue of the current network research workers,with the continuous development of computer technology,network attack after another.Attack signatures automatically extracting technology is an important technology of network security research.To study the characteristics of network attack data extraction algorithm as the starting point,through several sequence analysis algorithm for automatic extraction ratio,the introduction of an improved algorithm,and its application,application results show that the algorithm can effectively reduce the false alarm rate compared with other algorithms in terms of a certain application value.
其他文献
Recent years have seen more and more embedded devices used in IA (information appliance),PDA and industrial automation.In this paper,we propose a novel version of the application of embedded devices i
With the rapid development of Internet technology,how to establish the field of intelligent irrigation system based on Internet of things technology,realize the rational management of agricultural wat
The system combined closely with actual crop growth in Guanzhong arid area,and was on the basis of construction of agricultural information database and remote sensing database.It used C# application
The network monitoring can be divided into two modes: active and passive.These two modes can prevent crime.But both of them are highly tort.So we must protect the citizens privacy rights by legislatio
This paper proposes a highly secure image watermarking and digital signature algorithm based on ECC and MIRACL,the former is on the basis of ECDLP very difficult to solve,and the latter implements all
As one of the era core competitiveness,big data has become a hotspot in the field of information technology after cloud computing,Internet of things.Big data bring decision value for the enterprise an
We proprosed a symbolic approach and model learing approach for automatic testing.The main idea of our approach is to build an abstract interaction machine as well as its refinement process in order t
Right now,more and more attention has been absorbed by the safety and security protection system of residential area.Through an engineering design project,the security protection system based on digit
Social network has already been an important way to facilitate information exchange.One key challenge in social network is how to evaluate the reliability of users complex relationships.In this paper,
Query optimization is a Key research topic in the database research area aiming at solving the problem of premature convergence and local optimal trap in the traditional particle swarm optimization al