Intrusion detection is an advanced security technology that goes beyond traditional measures like access control, passwords, authentication, auditing, and firewalls. It safeguards against internal and external attacks, as well as misoperation. To establish a user's normal behavior, a set of behavior profiles must be created and maintained, describing the user's typical system usage. This paper presents a visualization algorithm for network intrusion scenes, employing a dual-engine structure that integrates network-based and host-based intrusion detection systems. The algorithm offers combined detection, reporting, and response capabilities. Simulation results demonstrate significant improvements in false alarm rates compared to traditional methods. The network engine implementation combines protocol analysis and pattern matching, narrowing down target matches and enhancing detection speed. The approach effectively meets the efficiency and accuracy requirements of intrusion detection systems in cloud computing environments.
In order to prevent the grid microservice architecture from illegal intrusion, it is necessary to verify the API gateway authority in the architecture. However, the current API gateway authority verification method has the problem of long execution time. In order to solve this problem, a new authorization verification method of API gateway in grid microservice architecture is designed. Take the framework management of microservices as the smallest independent unit of gateway verification, extract the API gateway business requirements, set the authentication enhancement module in combination with the grid microservice architecture, adjust the operation mode of public services such as extraction authentication, optimize the identity authorization and authority verification mode by using encryption algorithms, and realize the API gateway authority verification of the grid microservice architecture. The test results show that the average execution time of the power grid micro service architecture API gateway authority verification method in this paper is 2.843s and 3.632s less than that of the other two methods respectively, which indicates that the power grid micro service architecture API gateway authority verification method designed this time has more advantages in execution efficiency.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.