Proceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer

Application of Intrusion Detection Based on psychology in access control

Authors
Weinan Fu, Ziqiao Wang
Corresponding Author
Weinan Fu
Available Online June 2016.
DOI
10.2991/mmebc-16.2016.63How to use a DOI?
Keywords
Information security; network firewall; data mining; intrusion detection; development trend
Abstract

With the vigorous development of the Internet, more and more people use the network, the computer network to provide convenience, bring benefits, but also make the human face a huge challenge of information security. In the form of the development of modern information technology, a safe network system should not only means of defense, but it is necessary to have a means of firewall, defense, but also be able to real-time monitoring of network security, attack and counter attack, the network intrusion detection system. On the current situation of network security is all kinds of hacker events, network crime, virus has been in the stage of escalating, large portal website, government website, enterprise website, and individual users are these illegal criminals invade object, intrusion types and different, means rich utterly impossible, network security defend without delay. So intrusion detection system came into being. With the development of network intrusion detection technology, so that people have been focusing on the application of data mining in intrusion detection technology, if we can improve the data mining technology into the network intrusion detection, according to the specific characteristics of the intrusion detection system, the basic principle of applying data mining, optimize their combination, this will improve performance of intrusion detection system. This article will use the data mining technology to the network intrusion detection technology in the present situation and the future development trend is discussed.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer
Series
Advances in Engineering Research
Publication Date
June 2016
ISBN
978-94-6252-210-7
ISSN
2352-5401
DOI
10.2991/mmebc-16.2016.63How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Weinan Fu
AU  - Ziqiao Wang
PY  - 2016/06
DA  - 2016/06
TI  - Application of Intrusion Detection Based on psychology in access control
BT  - Proceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer
PB  - Atlantis Press
SP  - 303
EP  - 307
SN  - 2352-5401
UR  - https://doi.org/10.2991/mmebc-16.2016.63
DO  - 10.2991/mmebc-16.2016.63
ID  - Fu2016/06
ER  -