Paper
6 September 2022 Computer network intrusion detection system matching algorithm
Author Affiliations +
Proceedings Volume 12332, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022); 123321N (2022) https://doi.org/10.1117/12.2653217
Event: International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022), 2022, Chengdu, China
Abstract
In order to guarantee network security effectively and improve the performance and efficiency of computer network intrusion detection system, the matching algorithm of computer network intrusion detection system is studied. Firstly, the basic model of computer network intrusion detection is analyzed, and the multi-pattern matching algorithm of computer network intrusion detection system is proposed, which is integrated into the computer network. Then, the multi-pattern matching algorithm of computer network intrusion detection system is analyzed, and a computer network intrusion detection system based on the multi-pattern matching algorithm is designed, and the multi-pattern matching algorithm is improved to improve its effectiveness. Finally, an algorithm satisfying the requirements of computer network intrusion detection system is obtained by comparing with the conventional matching algorithm. Through the research of matching algorithm applied to computer network intrusion detection system, it shows certain social practicability.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ligang Zheng "Computer network intrusion detection system matching algorithm", Proc. SPIE 12332, International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022), 123321N (6 September 2022); https://doi.org/10.1117/12.2653217
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Computer intrusion detection

Computer networks

Computing systems

Genetic algorithms

Algorithm development

Data mining

Back to Top