DocumentCode :
3446273
Title :
Notice of Retraction
The IDS Model Adapt to Load Characteristic under IPv6/4 Environment
Author :
Chuyi Wei ; Zhiyi Fang ; Wei Li ; Xiaonan Liu ; Hongjun Yang
Author_Institution :
Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun
fYear :
2008
fDate :
12-14 Oct. 2008
Firstpage :
1
Lastpage :
4
Abstract :
Notice of Retraction

After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE´s Publication Principles.

We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

This paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamically rule matching tree adapt to load characteristic, reduces greatly the rule set that per packet or event need to be detected, improves the detection efficiency, can be utilized to solve the high packet-loss problem; this paper proposed to make use of Petri net to built a mode to the complicated aggressive behavior, form the complicated aggressive rule library, improve the detection accuracy rate; in view of IPv6 security problem, make use of Snort rule description language, construct the detection rule under IPv6 environment; finally construct the platform in the local area network, carry on the simulation experiment. The experiment proved fully the feasibility and validity of intrusion detective method adapt to load characteristic under IPv6/4 environment.
Keywords :
IP networks; Petri nets; decision trees; resource allocation; telecommunication security; IPv6 security; IPv6/4 environment; Petri net; Snort rule description language; decision-tree-based classification; intrusion detection system; load characteristic; local area network; packet loss; Computer networks; Computer security; Data acquisition; Data analysis; Event detection; Information analysis; Information security; Intrusion detection; Load modeling; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4244-2107-7
Type :
conf
DOI :
10.1109/WiCom.2008.1171
Filename :
4679079
Link To Document :
بازگشت