{"title":"网络数据包数据的在线处理,用于入侵检测系统","authors":"A. Jacobus, A. Sinsuw","doi":"10.1109/ICWT.2015.7449259","DOIUrl":null,"url":null,"abstract":"The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Network packet data online processing for intrusion detection system\",\"authors\":\"A. Jacobus, A. Sinsuw\",\"doi\":\"10.1109/ICWT.2015.7449259\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.\",\"PeriodicalId\":371814,\"journal\":{\"name\":\"2015 1st International Conference on Wireless and Telematics (ICWT)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 1st International Conference on Wireless and Telematics (ICWT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWT.2015.7449259\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 1st International Conference on Wireless and Telematics (ICWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWT.2015.7449259","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network packet data online processing for intrusion detection system
The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.