dc.description.abstract | The network technology has been one of motive forces today for enterprises growing. Any enterprises who want to save costs, increase efficiency, or catch up with world’s economical trend can not resist investment on networking. Though network technology brings us so many advantages, a very little negligence on network security will cause a destructive consequence to an enterprise. So, with more and more resources are open and shared on network, more technologies on how to protect and prevent information safety from potential intrusions are researched.
Intrusion detection system is popular in these years, which can detect any behaviors with bad intentions, and announce to security team in enterprise. Most Intrusion detection system use the method of pattern matching to judge an intrusion, the strong point for the method is its high detection rate, and easy to configure for different types of network environments. But with higher network speed and varies kinds of intrusion skills, the database of intrusion detection rule which Intrusion detection system relay on is swollen up day by day, and become a killer for Intrusion detection system’s efficiency.
In this paper, we tried to increase efficiency of a huge intrusion rule database accessed by Intrusion detection system by means of optimization, and the system for optimizing is automatically carried out in background to decrease the loading for an administrator. | en_US |