scholarly journals An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yajing Wang ◽  
Juan Ma ◽  
Ashutosh Sharma ◽  
Pradeep Kumar Singh ◽  
Gurjot Singh Gaba ◽  
...  

Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervised clustering algorithms based on shared nearest neighbors are proposed in this work to address intrusion detection by converting it into a problem of mining outliers using the network behavior dataset. The algorithm uses shared nearest neighbors as similarity, judges whether it is an outlier according to the number of nearest neighbors of a data point, and performs semisupervised clustering on the dataset where outliers are deleted. In the process of semisupervised clustering, vast prior knowledge is added, and the dataset is clustered according to the principle of graph segmentation. The novelty of the proposed algorithm lies in outlier detection while effectively avoiding the dependence on parameters, thus eliminating the influence of outliers on clustering. This article uses real datasets: lypmphography and glass for simulation purposes. The simulation results show that the algorithm proposed in this paper can effectively detect outliers and has a good clustering effect. Furthermore, the experimentation reveals that the outlier detection-based SCA-SNN algorithm has the best practical effect on the dataset without outliers, clearly validating the clustering performance of the outlier detection-based SCA-SNN algorithm. Furthermore, compared to the other state-of-the-art anomaly detection method, it was revealed that the anomaly detection technology based on outlier mining does not require a training process. Thus, they overcome the current anomaly detection problems caused due to incomplete normal patterns in training samples.

2014 ◽  
Vol 608-609 ◽  
pp. 526-530
Author(s):  
Biao Li

With the development and popularization of the computer network, the security problem has increasingly become the focus of common concern. The computer network safety problems mainly include: protocol design issues, awareness, management system and technical operation. Hackers on the computer network attack techniques: Deceptive attack, masquerade attacks, vulnerability attack, covert attack and technical attack. Accordingly, we should take the corresponding safety countermeasures: strengthen network security education, using the network protection technology, detection technology and anti-virus technology. This paper mainly analyzes the defects and the security problems of computer network, discusses about the maintenance of computer network security and the way for computer network attack technology defense strategy.


Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

Let us make a statement of fact here that three principles define computer network security. These principles are: prevention, detection, and response. The high degree of iIternetworking and our growing dependence on computers have both, along with others factors, created an insatiable demand for information on and about people and products. This, in turn, has created a new class of hackers and information thieves determined to raid computer networks for proprietary information. All of a sudden, computer networks have come to be pots of honey attracting many. Consequently, the stampede for information from computer networks must be met with strong mechanisms, first to detect those trying to penetrate the system, secondly to prevent them from trying, and thirdly to respond to the attempt, successful or not. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention, because if we are able to detect all security threats and prevent them, then there is no need for response. So we will focus on prevention in this chapter, but before we do, let us define the working terms.


2021 ◽  
Vol 22 (2) ◽  
Author(s):  
Hongkai Lin ◽  
Feng Zhao ◽  
Lina Qin ◽  
Hongkai Lin

With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network.


Sign in / Sign up

Export Citation Format

Share Document