Application of Intrusion Detection Based on psychology in access control
- DOI
- 10.2991/mmebc-16.2016.63How to use a DOI?
- Keywords
- Information security; network firewall; data mining; intrusion detection; development trend
- Abstract
With the vigorous development of the Internet, more and more people use the network, the computer network to provide convenience, bring benefits, but also make the human face a huge challenge of information security. In the form of the development of modern information technology, a safe network system should not only means of defense, but it is necessary to have a means of firewall, defense, but also be able to real-time monitoring of network security, attack and counter attack, the network intrusion detection system. On the current situation of network security is all kinds of hacker events, network crime, virus has been in the stage of escalating, large portal website, government website, enterprise website, and individual users are these illegal criminals invade object, intrusion types and different, means rich utterly impossible, network security defend without delay. So intrusion detection system came into being. With the development of network intrusion detection technology, so that people have been focusing on the application of data mining in intrusion detection technology, if we can improve the data mining technology into the network intrusion detection, according to the specific characteristics of the intrusion detection system, the basic principle of applying data mining, optimize their combination, this will improve performance of intrusion detection system. This article will use the data mining technology to the network intrusion detection technology in the present situation and the future development trend is discussed.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Weinan Fu AU - Ziqiao Wang PY - 2016/06 DA - 2016/06 TI - Application of Intrusion Detection Based on psychology in access control BT - Proceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer PB - Atlantis Press SP - 303 EP - 307 SN - 2352-5401 UR - https://doi.org/10.2991/mmebc-16.2016.63 DO - 10.2991/mmebc-16.2016.63 ID - Fu2016/06 ER -