Research on the WSN Intrusion Detection System Based on Improved BM Pattern Match Algorithm

This paper studies and summarizes the frequent pattern match algorithms used in the network intrusion detection system and analyzes and compares the pattern match algorithms in the well-known Snort. To optimize the detection efficiency and reduce the time and space complexity of the algorithm, this paper designs the improved BM pattern match algorithm based on the network intrusion detection system, applies the improved BM pattern match algorithm into the actual network intrusion detection, performs scientific assessment for the processing results and validates the feasibility and high efficiency of the algorithm.

[1]  Zenggang Xiong,et al.  Immuno-inspired Security Defense Mechanisms for Computer Systems , 2012 .

[2]  Xiaoqiang Wang Study on Genetic Algorithm Optimization for Support Vector Machine in Network Intrusion Detection , 2012 .

[3]  Ge Li,et al.  Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm , 2012 .

[4]  Shu Chang A Novel Attribute Reduction Method based on Rough Sets and its Application , 2012 .

[5]  S. Janakiraman,et al.  ACO based Distributed Intrusion Detection System , 2009, J. Digit. Content Technol. its Appl..

[6]  Bernard L. Menezes,et al.  Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques , 2010, Int. J. Adv. Comp. Techn..

[7]  Li Li,et al.  An Efficient Automaton Based Matching Algorithm and Its Application in Intrusion Detection System , 2011 .

[8]  S. Janakiraman,et al.  An Intelligent Distributed Intrusion Detection System using Genetic Algorithm , 2009, J. Convergence Inf. Technol..

[9]  Dai Hong Enhanced Pattern Matching Performance Using Improved Boyer Moore Horspool Algorithm , 2011 .

[10]  Yong Chen,et al.  A New Approach for Maximal Frequent Sequential Patterns Mining Over Data Streams , 2011 .

[11]  Lijuan Liu,et al.  Intrusion Detection Using BP Optimized by PSO , 2012 .

[12]  Liang Hu,et al.  Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching , 2010, J. Convergence Inf. Technol..

[13]  Humphrey Waita Njogu,et al.  An Efficient Approach to Manage IDS Alerts , 2011 .

[14]  Hong Lianxi The Research on Anti-interference Technology for Network of Optimized Support Vector Machine Based on Genetic Algorithm , 2012 .

[15]  Shunyi Zhang,et al.  Network Intrusion Detection Based on Improved Proximal SVM , 2011 .