Research_on_Computer_Network_Technology_System_Bas
Research_on_Computer_Network_Technology_System_Bas
Abstract. This article introduces computer network intrusion detection systems and their
classification based on artificial intelligence technology, and points out the challenges
that intrusion detection systems (IDS) are facing in wireless sensor computer networks.
On this basis, a hierarchical multi-layer wireless sensor network intrusion detection
system and technology based on artificial intelligence technology Agent is proposed,
and its network structure, working principle and performance are analysed.
1. Introduction
Intrusion detection technology is a new type of computer network security technology based on artificial
intelligence technology that actively protects itself from attacks. It collects information such as operating
systems, applications, and network packets to find violations of security policies or crises in systems
and data streams. System security behaviour. The system designed for this purpose is called intrusion
detection system (IDS). IDS is a very useful supplement to firewalls. It can not only detect attacks from
external networks in real time, but also detect unauthorized activities from inside the network,
effectively making up for the lack of firewalls, and is considered the second way behind firewalls.
Security gate. A successful intrusion detection system can not only keep the system administrator aware
of any changes in the entire network system, but also provide support for the formulation of network
security strategies.
The existing distributed intrusion detection system usually adopts the following three analysis
models for distributed intrusion: central analysis model, hierarchical analysis model, and collaborative
analysis model. The central analysis model has a large network load, poor scalability, long delay, and
single point of failure. It is only suitable for small-scale networks [1]. The problems of heavy network
load and single point of failure of the analytic hierarchy model still exist. The collaborative analysis
model has increased single-point complexity, poor scalability, heavy network transmission load, and so
on. This paper uses the advantages of mobile agent and applies it to distributed intrusion detection, and
proposes a distributed intrusion detection system based on mobile agent, trying to solve the problem of
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
CDMMS 2020 IOP Publishing
Journal of Physics: Conference Series 1802 (2021) 042028 doi:10.1088/1742-6596/1802/4/042028
excessive network bandwidth usage, low detection efficiency, and robustness of traditional intrusion
detection models. Issues such as weak sex.
The description of each module is as follows: For the assistance of the control centre, using a highly
professional server control centre, the system administrator can use it to complete the update task of all
2
CDMMS 2020 IOP Publishing
Journal of Physics: Conference Series 1802 (2021) 042028 doi:10.1088/1742-6596/1802/4/042028
the rule sets. The sub-regional control centre controls the network host processing of a certain segment
of the network and sub-networks. It is responsible for the task [3]. After receiving the control centre
task, it orders the host under the control to perform the task of receiving the reported information of the
network host, and monitors abnormalities in the diagnosis information. In case of the situation, input the
intrusion characteristic pattern into the database, and then report the analysis result to the control centre.
It consists of two parts, the chi-square flow determination model and the chi-square flow monitor.
The chi-square flow determination model will further process the data in the SIP feature database to
obtain the data used for the calculation of the chi-square statistic value. The chi-square flow monitor
uses these data to calculate the chi-square statistic and judge whether an abnormality occurs. A detailed
description of this process is given below. The analysis of the SIP session establishment process shows
that the distribution of the number of SIP messages under normal conditions shows a stable distribution.
These messages include INVITE, ACK, 200. In this article, it is shown that in the case of SIP single-
source flooding attack, the attacker cannot complete the process of session establishment, which leads
to the abnormal distribution of SIP messages [4]. Therefore, flooding attacks can be detected through
changes in SIP message distribution. We use chi-square statistics to measure the similarity of SIP
message distribution based on sliding time window sequence. The calculation method of chi-square
statistics is as formula (1). Among them, k = 3, ni represents the proportion of message msgi in the
current time window, and ni represents the proportion of msgi in the previous time window. msg are
three types of SIP messages: INVITE, ACK, and 200.
( ni − ni )
2
χ 2 =Σ ik=1 (1)
ni
The web host is a mobile agent platform that can provide an operating environment for mobile. If the
web host prioritizes the suspected situation, but cannot judge by itself, then the relevant data will be fed
back to the district control centre, and then a deeper analysis and processing will be carried out to
discover many Whether the host computer invades the network. Agent library plays an important role
in the process of intrusion detection system [5]. Especially in the execution operation, the control centre
directly controls the management part, so that the new configuration that can be generated can perform
corresponding work according to actual needs, and the original execution can be reconfigured and
deleted What is no longer needed can be achieved. Figure 2 is a schematic diagram of the relationship
between the various modules.
3
CDMMS 2020 IOP Publishing
Journal of Physics: Conference Series 1802 (2021) 042028 doi:10.1088/1742-6596/1802/4/042028
3.2.1. Detector layer. This layer provides multiple types of detectors to collect raw data from the
network, host, and other devices.
3.2.2. Collaborative analyser layer. This layer provides a corresponding analyser for each detector.
Each analyser can identify intrusions based on the knowledge of the ontology, and send collaborative
analysis commands to other analysers when needed. Each cooperative detector and its corresponding
detector form an intrusion detection agent. For example, a host detector and a host cooperative analyser
form a host intrusion detection agent. Each collaborative analyser has a local ontology knowledge base,
which can complete detection tasks independently, and can also work with other intrusion detection
agents [6]. The intrusion detection agent can automatically cache the relevant data of the global intrusion
detection ontology knowledge base to the local according to the different management probes, forming
its own local ontology knowledge base, reducing a lot of communication burden.
3.2.3. Knowledge management. On the one hand, this layer maintains the ontology knowledge base and
maintains the consistency of ontology knowledge; on the other hand, it alarms when an attack is detected
and takes corresponding response measures. This layer includes knowledge base update component,
blackboard, alarm fusion component and alarm console. The knowledge base update component is used
for administrators to maintain and update the knowledge base of intrusion detection ontology; the
blackboard is mainly used for the collaboration of multiple detectors to store each agent Access
addresses, alarm message lists, and data required for collaboration; the alarm fusion component mainly
merges alarm information; the alarm console provides a user interface with the network administrator,
and outputs alarms or sends alarm emails on the screen. The knowledge management agent composed
of knowledge base update component, blackboard, alarm fusion component and alarm console complete
functions such as collaborative data forwarding, alarm fusion, and maintenance of the intrusion detection
ontology knowledge base.
4. Experimental simulation
MADIDS is compatible with traditional detection algorithms. In order to make a more comprehensive
and representative MADIDS test, network-based and host-based detection algorithms are used.
4
CDMMS 2020 IOP Publishing
Journal of Physics: Conference Series 1802 (2021) 042028 doi:10.1088/1742-6596/1802/4/042028
The objects that can be monitored include CPU consumption, disk occupancy, number of open files, etc.
The test results are shown in Table 1, Table 2 and Table 3.
It can be seen from the data in the table that the system can detect all attack modes when the network
load is light, but when the load reaches a high load or even 100%, it cannot detect attack modes. This is
because when the network is working at full capacity, the data packets generated by the attack are too
small compared with the network traffic, so that they are completely annihilated, and the intrusion
detection system has no time to process these data packets. The reason why the CPU consumption can
be detected is because the CPU consumption itself has nothing to do with the network.
5. Conclusion
The high degree of openness of the wireless sensor network makes the attacker always take the risk of
entering multiple times. Even if the security technology guarantees that the network will not be breached
in a short time, the attacker can obtain the network itself and its protection in several attempts. Various
information of the system, and disguise itself based on this information and re-attack. If the detection
system's understanding of the attack stays at a narrow level, the network will be breached sooner or later.
Therefore, it is imperative to improve the identification and generalization of intrusion features in the
detection system. This requires the introduction of an intelligent intrusion detection system. To realize
intelligence, the most direct and effective way is to add the methods used for the identification and
generalization of intrusion features, such as neural network, genetic algorithm, fuzzy technology,
immune principle, etc., to the intrusion detection agent function. The paradigm of intelligent application
is the expert system. For behaviours that cannot be determined by general feature detection or anomaly
detection as an intrusion, expert systems can often draw credible judgments based on the update and
search of its knowledge base. Therefore, the more intelligent Agent intrusion detection system should
be integrated into the concept of expert system, so that it has the function of continuous self-learning
and self-adaptation.
5
CDMMS 2020 IOP Publishing
Journal of Physics: Conference Series 1802 (2021) 042028 doi:10.1088/1742-6596/1802/4/042028
Acknowledgments
This work was financially supported by Comparative study and practice of online and offline Hybrid
Teaching Mode -- Taking the course of computer culture foundation in Higher Vocational Colleges as
an example (Project No.: 2020-afcec-328) fund
This work was financially supported by Natural Science Foundation of Tianjin(17JCQNJC04700)
fund.
References
[1] Peddabachigari, S., Abraham, A., Grosan, C., & Thomas, J. Modeling intrusion detection system
using hybrid intelligent systems. Journal of network and computer applications, 30(1) (2007)
114-132.
[2] Mukkamala, S., Sung, A. H., & Abraham, A. Intrusion detection using an ensemble of intelligent
paradigms. Journal of network and computer applications, 28(2) (2005) 167-182.
[3] Elshoush, H. T., & Osman, I. M. Alert correlation in collaborative intelligent intrusion detection
systems—A survey. Applied Soft Computing, 11(7) (2011) 4349-4365.
[4] Shenfield, A., Day, D., & Ayesh, A. Intelligent intrusion detection systems using artificial neural
networks. ICT Express, 4(2) (2018) 95-99.
[5] Lin, S. W., Ying, K. C., Lee, C. Y., & Lee, Z. J. An intelligent algorithm with feature selection
and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10)
(2012) 3285-3290.
[6] Saeed, A., Ahmadinia, A., Javed, A., & Larijani, H. Intelligent intrusion detection in low-power
IoTs. ACM Transactions on Internet Technology (TOIT), 16(4) (2016) 1-25.
[7] Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. An intelligent intrusion detection system
(IDS) for anomaly and misuse detection in computer networks. Expert systems with
Applications, 29(4) (2005) 713-722.