scholarly journals High Camouflage Intrusion Detection Method for Structured Database Based on Multi Pattern Matching

2021 ◽  
Vol 2066 (1) ◽  
pp. 012029
Author(s):  
Dawei Song ◽  
Xun Zhu ◽  
Fengjuan Ma

Abstract with the rise and rapid development of mobile communication, intelligent terminal and data system, we are entering the era of mobile Internet. In recent years, more and more data need to be processed and transmitted in daily life, and structured data is becoming more and more important. Among them, multi-mode matching technology can search data in a wider range. Matching for multiple patterns at a time avoids unnecessary matching, accelerates the matching process, and helps to find longer matching information and obtain higher accuracy. This paper mainly introduces the high camouflage intrusion detection method of structured database based on multi-mode matching. This paper uses the high disguised intrusion detection method of structured database based on multi-mode matching, collects sensitive information of wireless access points and stations through the communication of WLAN in multimodal matching, then intercepts and forges data packets to initiate replay attack. Replay attack is characterized by abnormal traffic in the network, which can be detected by statistical analysis. The experimental results show that the high camouflage intrusion detection method based on multi-mode matching makes the camouflage intrusion detection rate increase by 23%. The limitations of the design and research of camouflage intrusion detection are analyzed, discussed and summarized, so as to enrich the academic research results.

2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Wenjuan Lian ◽  
Guoqing Nie ◽  
Bin Jia ◽  
Dandan Shi ◽  
Qi Fan ◽  
...  

With the rapid development of the Internet, various forms of network attack have emerged, so how to detect abnormal behavior effectively and to recognize their attack categories accurately have become an important research subject in the field of cyberspace security. Recently, many hot machine learning-based approaches are applied in the Intrusion Detection System (IDS) to construct a data-driven model. The methods are beneficial to reduce the time and cost of manual detection. However, the real-time network data contain an ocean of redundant terms and noises, and some existing intrusion detection technologies have lower accuracy and inadequate ability of feature extraction. In order to solve the above problems, this paper proposes an intrusion detection method based on the Decision Tree-Recursive Feature Elimination (DT-RFE) feature in ensemble learning. We firstly propose a data processing method by the Decision Tree-Based Recursive Elimination Algorithm to select features and to reduce the feature dimension. This method eliminates the redundant and uncorrelated data from the dataset to achieve better resource utilization and to reduce time complexity. In this paper, we use the Stacking ensemble learning algorithm by combining Decision Tree (DT) with Recursive Feature Elimination (RFE) methods. Finally, a series of comparison experiments by cross-validation on the KDD CUP 99 and NSL-KDD datasets indicate that the DT-RFE and Stacking-based approach can better improve the performance of the IDS, and the accuracy for all kinds of features is higher than 99%, except in the case of U2R accuracy, which is 98%.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Gang Lei ◽  
Lejun Ji ◽  
Ruiwen Ji ◽  
Yuanlong Cao ◽  
Wei Yang ◽  
...  

With the rapid development of mobile Internet technology and multihost terminal devices, multipath transmission protocol has been widely concerned. Among them, multipath TCP (MPTCP) has become a hot research protocol in recent years because of its good transmission performance and Internet compatibility. Due to the increasing power of Low-Rate Distributed Denial of Service (LDDoS) attack, the network security situation is becoming increasingly serious. The robustness of MPTCP network has become an urgent performance index to improve. Therefore, it is very necessary to detect LDDoS abnormal traffic timely and effectively in the transmission system based on MPTCP. This paper tries to use wavelet transform technology to decompose and reconstruct network traffic and find a detection method of LDDoS abnormal traffic in the MPTCP transmission system. The experimental results show that in the MPTCP transmission system, the signal processing technology based on wavelet transform can realize the identification of LDDoS abnormal traffic. It indicates a direction worth further exploration for the detection and defense of the LDDoS attack.


2018 ◽  
Vol 20 (1) ◽  
pp. 34-39 ◽  
Author(s):  
Tsutomu Arakawa ◽  
Yoshiko Kita

Previously, we have reviewed in this journal (Arakawa, T., Kita, Y., Curr. Protein Pept. Sci., 15, 608-620, 2014) the interaction of arginine with proteins and various applications of this solvent additive in the area of protein formulations and downstream processes. In this special issue, we expand the concept of protein-solvent interaction into the analysis of the effects of solvent additives on various column chromatography, including mixed-mode chromatography. Earlier in our research, we have studied the interactions of such a variety of solvent additives as sugars, salts, amino acids, polymers and organic solvents with a variety of proteins, which resulted in mechanistic understanding on their protein stabilization and precipitation effects, the latter known as Hofmeister series. While such a study was then a pure academic research, rapid development of genetic engineering technologies and resultant biotechnologies made it a valuable knowledge in fully utilizing solvent additives in manipulation of protein solution, including column chromatography.


2020 ◽  
Vol 12 (16) ◽  
pp. 6333
Author(s):  
Chan Liu ◽  
Raymond K. H. Chan ◽  
Maofu Wang ◽  
Zhe Yang

Harnessing the rapid development of mobile internet technology, the sharing economy has experienced unprecedented growth in the global economy, especially in China. Likely due to its increasing popularity, more and more businesses have adopted this label in China. There is a concern as to the essential meaning of the sharing economy. As it is difficult to have a universally accepted definition, we aim to map the sharing economy and demystify the use of it in China in this paper. We propose seven organizing essential elements of the sharing economy: access use rights instead of ownership, idle capacity, short term, peer-to-peer, Internet platforms mediated, for monetary profit, and shared value orientation. By satisfying all or only parts of these elements, we propose one typology of sharing economy, and to differentiate bona fide sharing economy from quasi- and pseudo-sharing economy. Finally, there are still many problems that need to be solved urgently in the real sharing economy from the perspective of the government, companies and individuals.


2021 ◽  
Vol 1966 (1) ◽  
pp. 012051
Author(s):  
Shuai Zou ◽  
Fangwei Zhong ◽  
Bing Han ◽  
Hao Sun ◽  
Tao Qian ◽  
...  

Nanophotonics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 1265-1272
Author(s):  
Mengyuan Ye ◽  
Chunlei Sun ◽  
Yu Yu ◽  
Yunhong Ding ◽  
Xinliang Zhang

Abstract Ring resonator is an essential element in silicon integrated circuit, it is widely used as filter, wavelength multiplexer and switch in single-mode operation regime. As the rapid development of mode division multiplexing (MDM) technique, ring resonator that can process multi-mode signals simultaneously and uniformly is highly desired. However, the severe modal dispersion makes identical transmission for different modes very hard. In this paper, by breaking through the limitation of conventional multi-mode manipulation design with evanescent coupling or mode interference, we propose and demonstrate a multi-mode ring resonator (MMRR) inspired by the free space geometric optics. Arbitrary number of supporting modes can be achieved by simply widening the waveguide width. For proof-of-concept demonstration, an MMRR supporting four modes is fabricated with uniform transmittance. Furthermore, architecture of cascaded four MMRRs are also demonstrated experimentally.


Sign in / Sign up

Export Citation Format

Share Document