Study on the technology of intrusion detection theory based on rough set and genetic algorithm
|Course||Communication and Information System|
|Keywords||intrusion detection rough set genetic algorithm attribute reduction|
Nowadays, with the rapid development of the computer technology, network technology and telecommunication technology, people are enjoying great conveniences which brought by the information network, but at the same time, they are also suffering from the information security problems. The assaults that launched by network "hacker" are becoming more and more skillful, and the problems of information security are severe. The security issues can not be resolved perfectly just by the conventional technologies of the network safety defense, such as encryption technology, the identification technology, access control technology and the firewall technology. So the research and application of intrusion detection technology is a good solution to the problem of information security.This article firstly introduce the basic concepts and historical development of the intrusion detection technology, and its research status quo and development trend, then describes the intrusion detection technology and intrusion detection system in detail, and points out the problems of traditional intrusion detection methods, and at last puts forward a new arithmetic based on the rough set theory and genetic algorithm for intrusion detection technology.After the introduction of the intrusion detection technology, the rough set theory and genetic algorithm theory are introduced in detail. In rough set theory, its two core issues:discretization and attribute reduction were studied, and a new improved algorithm for attribute reduction was put forward. In the genetic algorithm theory, at first introduces the basic genetic algorithm, and points out its advantages and disadvantages, then puts forward an improved niche genetic algorithm. At last, a method based on rough set theory and genetic algorithm for intrusion detection technology is introduced.In this paper I develop new ideas on the basis of predecessors’researches, and make meaningful improvement in algorithms. Through the works such as analysis of data sources, data preprocessing until the last simulation experiments,I blend the theories and algorithms into the experiments successfully. At last a simple intrusion detection simulation system was realized.Finally through the simulation experiment, verify the new improved intrusion detection algorithm is feasible and effective.