期刊文献+

基于SVM的MANET路由层入侵检测 被引量:1

Intrusion detection for routing layer of MANET based on SVM
在线阅读 下载PDF
导出
摘要 针对MANET(移动自组织网络)路由层的攻击,通过对MANET路由层AODV(Ad hoc on-demand distance vector)路由协议交互行为的分析,提取了9个路由交互过程特征,将入侵检测问题转换为对正常行为和异常行为分类识别问题,采用SVM(支持向量机)算法,设计了一种分布式异常检测系统。仿真结果表明,使用该检测系统的检测率达到97%以上,从而验证了该系统的可行性,同时也验证了所提取的路由交互行为特征的有效性。 Aiming at the attack of routing layer of MANET through analyzing the features of the traffic behavior of the AODV routing protocol in routing layer of MANET, this paper picked up nine features of the traffic behavior and translated the problem of intrusion detection to classifying the behavior between normal and abnormal.As a result, designed a distributed SVM-besed anomaly detection system.The simulations show that the accurate recognition rate of this system is above 97%, and which demonstrates that the system is effective and the features of the traffic behavior which this paper picked up is feasible.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1873-1875,1878,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z207)
关键词 移动自组织网 路由协议攻击 入侵检测 交互行为 支持向量机 mobile Ad hoc network attacks of routing protocols intrusion detection traffic behavior support vector machine(SVM)
  • 相关文献

参考文献1

二级参考文献12

  • 1John A. Stankovic, Tarek F. Abdelzaher, Chenyang Lu et al. Real-time communication and coordination in embedded sensor networks[C]. Procedings of the IEEE, 2003, 91(7):1002-1022.
  • 2Chris Karlof, Naveen Sastry ,Umesh Shankar et al. TinySec: Tiny OS Link Layer Security Proposal - version 1.0[EB/OL]. http://webs.cs.berkeley.edu/tos.
  • 3Qi Xue,Aura Ganz. Runtime security composition for sensor networks[R]. Multimedia Networks Lab ECE Department, University of Massachusetts.
  • 4Sasha Slijepcevic,Vlasios Tsiatsis, Scott Zimbeck. On communication security in wireless Ad-Hoc sensor networks[C].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  • 5Adrian Perrig, Robert Szewczyk, Victor Wen et al. SPINS: security protocols for sensor networks[C]. In:Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
  • 6Liu, P. Ning. Efficient distributed of key chain commitments for broadcast authentication in distributed sensor networks[C]. To appear in NDSS'03, 2003.
  • 7Jajodia S. LEAP: efficient security mechanisms for large-ScaleDistributed sensor networks[C]. To appear in the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
  • 8Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei .Random key assignment for secure wireless sensor networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA, 2003.
  • 9Haowen Chan, Adrian Perrig, Dawn Song. Random key predistribution schemes for sensor networks[C]. In:Proceedings of the IEEE Symposium on Security andPrivacy, Oakland, California-USA, 2003, 97-213.
  • 10Lin Xue-yan, Zhang Lin. Modern cellular and molecular immunology[M]. Beijing: Science Press, 2000.

共引文献9

同被引文献14

  • 1Indirani G, Selvakumar K. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MA- NET) [J]. International Journal of Parallel, Emergent and Dis- tributed Systems, 2013 (ahead-of-print) .. 1-14.
  • 2Mechtri L,Djemili F T,Ghanemi S. On the Design of a New In- trusion Detection System for Securing MANET: An Agent- Based Approach[J]. International Journal of Advanced Comput- er Science, 2013,3 (6).
  • 3Tripathi S S, Agrawal S. A Survey on Enhanced Intrusion De- tection System in Mobile Ad-hoe Network [J]. International Journal of Advanced Research in Computer Engineering Technology (IJARCET), 2012,1 (7) : 44-48.
  • 4Kahn R. The organization of computer resources into a packet radio network [J]. Communications, IEEE Transactions on, 1977,25(1) 169-178.
  • 5Jubin J, Tomow J D. The DARPA packet radio network proto- cols[J]. Proceedings of the IEEE, 1987,75 (1) : 21-32.
  • 6Anderson J P. Computer security threat monitoring and surveil- lance[R]. James P. Anderson Company, Fort Washington, Penn- sylvania, 1980.
  • 7Denning D E. An intrusion-detection model[J]. Software Engi- neering, IEEE Transactions on, 1987 (2) : 222-232.
  • 8Zhang Y, Lee W, Huang Y A. Intrusion detection techniques for mobile wireless networks [J]. Wireless Networks, 2003,9 ( 5 ) 545-556.
  • 9Huang Y, Lee W. A cooperative intrusion detection system for ad hoc networks[C]//Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 2003:135-147.
  • 10Shim W, Kim G, Kim S. A distributed sinkhole detection method using cluster analysis [J]. Expert Systems with Applications, 2010,37(12) : 8486-8491.

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部