Intrusion detection technology is a branch of modern network security technology. Intrusion detection technology can capture the drawbacks of network security more quickly and stably, and ensure network security through related algorithms.
Keywords: intrusion detection technology; Network security; App application
1 Introduction
Since 2 1 century, computer technology and electronic information have developed rapidly, and then with the upgrading of the internet, the network has entered thousands of households, which indicates that mankind has entered the information society. Network also exists as a means of survival closely related to human life. Our daily life and work is the process of obtaining and utilizing network resources. Efficient resource acquisition will create higher value for us and make us gain greater competitive advantage in our work and life. Intrusion detection technology can help users achieve network security, help managers manage intruders, and make network security more scientific and technological. Different from previous manual records, intrusion detection technology has the following advantages: efficient data processing speed and accurate accuracy. By searching the name, classification and security of intruders, it is not only fast, but also accurate. People are no longer limited to searching for intruders in the network library, but only need to input the network they need or query the relevant detailed information by category in the intrusion detection technology, which not only facilitates security, but also reduces the amount of manual labor and greatly saves costs. The purpose of intrusion detection technology is to help people find intruders quickly, and then protect network security, query their own security information status, so that managers can manage the status of intruders more conveniently and manage users' security behavior efficiently. It saves time and brings greater convenience to people.
2 Feasibility analysis
The purpose of feasibility analysis of intrusion detection technology is to determine whether intrusion detection technology can solve the problem and whether it is worth solving under the existing technical, economic and personnel conditions. Through the analysis and investigation of user applications, a feasible scheme is put forward and demonstrated. Next, the feasibility of intrusion detection technology is analyzed from the following three aspects.
2. 1 technical feasibility
The technical feasibility is to consider whether the development of intrusion detection technology can be successfully completed with the existing technology and meet the development and application. Intrusion detection technology adopts intrusion detection algorithm, which has the advantages of easy development, simple operation and stability. The used intrusion detection technology is mature and belongs to the current popular development technology, so the intrusion detection technology is completely feasible in technical development.
2.2 Operational feasibility
Intrusion detection technology is an intrusion detection technology based on data collection and processing, which belongs to a relatively stable state. Moreover, this mode and intrusion detection technology are common software technologies, and they should be able to learn and get started quickly in operation. In terms of user operation, a simple and clear way is adopted, which greatly improves the user's experience and fully conforms to the fast, convenient and safe application of users, so the intrusion detection technology is completely feasible in operation.
2.3 Economic feasibility
Economic feasibility study is to estimate whether the development cost of the project is reasonable and judge whether the project can meet the immediate interests of users. The establishment of intrusion detection technology is relatively simple, the required application software and hardware are easily available, and the development cost is low. In the operation and maintenance of background intrusion detection technology, because the intrusion detection technology is operated by managers, it can be managed by managers, which reduces the traditional labor and saves a sum of money, and can be used to better build the placement and protection of intruders, which obviously improves the work efficiency, so it is completely feasible in this respect.
Application Analysis of Intrusion Detection Technology
3. 1 application overview
3. 1. 1 The whole target intrusion detection technology can solve the problems of low efficiency, slow retrieval speed, heavy workload of virus statistics and no algorithm removal caused by manual operation in some networks. This intrusion detection technology can be used by two types of users: 1. In the intrusion detection technology, users can search and find in detail according to the algorithm, remove intruders through the algorithm, modify their own information, query security information and view the detailed information of intruders. 2. Managers can easily add, modify and delete security protection modules, delete or add security protection modules, remove viruses, manage according to the security situation, and add or modify algorithm information of intrusion detection technology. 3. 1.2 user types There are two main types of control users of intrusion detection technology: network administrators and ordinary users, and different identities have different rights. After users enter the intrusion detection technology through the algorithm structure, they can find the security level they need, then remove the algorithm, request protection, and check their own security situation. After the administrator enters the management interface as an administrator, he will manage the intruders and users accordingly.
3.2 Application model
3.2. 1 Function uses intrusion detection technology' In order to realize the efficient security algorithm of users, facilitate the query of related intruders, and enable managers to manage users and intruders conveniently and effectively. Intrusion detection technology mainly needs to complete the following functions: 1. Log in. Login is divided into ordinary user login and administrator login. After the verification of intrusion detection technology, users and administrators can enter intrusion detection technology. 2. Query function: There are two identity query functions, users can search for related intruders by category, or query their own security situation by inputting the specific names and types of intruders; Managers can query users' security and intruders. 3. Management function: The manager mainly performs operations such as adding, deleting and replacing intruders, reviews the user's algorithm removal request, and manages the user's status. 4. Algorithm cleaning function: After the user logs in, the network to be cleaned can be selected by algorithm, and the virus can be isolated only after being approved by the administrator. 3.2.2 After users with security function enter the intrusion detection technology through the algorithm structure, they can find a secure network through the intrusion detection algorithm. Only when the user's credit is good and the virus is still in the virus database can the algorithm be removed, and the virus removal operation can be completed after the time of virus isolation is set. Through the implementation of intrusion detection algorithm, the administrator can operate the user's security situation. 3.2.3 Administrator function The administrator who applies intrusion detection technology mainly manages users and intruders of intrusion detection technology. Intruder management includes adding, deleting and replacing relevant information and modifying the specific details of intruders; User management includes auditing users' algorithms for removing intruders' requests, managing users' normal or frozen status, and checking users' security status. At the same time, the administrator can also modify and add the algorithm structure, and can also modify his own login password.
References:
[1] Hu Tianqi, Shan Jianfeng, Song Xiaotao. Analog circuit diagnosis method based on improved PSO-LSSVM [J]. Computer technology and development. 20 15(06)
[2] Li Shiqiong. Analysis and Research on Association Rules Mining Algorithm in Data Mining [J]. Electronic Technology and Software Engineering.2015 (04)
[3] Hu Xiu. Research on Web-based Data Mining Technology [J]. Software Guide.2015 (01)
;