期刊文献+

Rough Outlier Detection Based Security Risk Analysis Methodology 被引量:13

Rough Outlier Detection Based Security Risk Analysis Methodology
在线阅读 下载PDF
导出
摘要 Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measurement of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm. Security is a nonfunctional information system attribute that plays a crucial role in wide sensor network application domains. Security risk can be quantified as the combination of the probability that a sensor network system may fail and the evaluation of the severity of the damage caused by the failure. In this paper, we devise a methodology of Rough Outlier Detection (ROD) for the detection of security-based risk factor, which originates from violations of attack requirements (namely, attack risks). The methodology elaborates dimension reduction method to analyze the attack risk probability from high dimensional and nonlinear data set, and combines it with rough redundancy reduction and the distance measure- ment of kernel function which is obtained using the ROD. In this way, it is possible to determine the risky scenarios, and the analysis feedback can be used to improve the sensor network system design. We illustrate the methodology in the DARPA case set study using step-by-step approach and then prove that the method is effective in lowering the rate of false alarm.
作者 Li Qianmu Li Jia
出处 《China Communications》 SCIE CSCD 2012年第7期14-21,共8页 中国通信(英文版)
基金 the Jiangsu 973 Scientific Project,the National Natural Science Foundation of China,the Jiangsu Natural Science Foundation,the Aerospace Innovation Fund,the Lianyungang Science & Technology Project
关键词 rough outlier risk analysis dimensionality reduction 风险分析方法 安全风险 粗糙 传感器网络 信息系统 异常检测 风险概率 DARPA
  • 相关文献

参考文献3

二级参考文献59

共引文献22

同被引文献85

  • 1刘兴华,奚宏生.视频业务的分布式协同接入控制建模[J].新型工业化,2013,2(1):68-78. 被引量:9
  • 2闫志鸿,胡婷,宋永伦.铝合金方波交流TIG焊熔池图像处理[J].新型工业化,2013,2(10):61-66. 被引量:8
  • 3尚志军,曾鹏,于海斌.无线传感器网络节点定位问题[J].计算机科学,2004,31(10):35-38. 被引量:29
  • 4于海斌,曾鹏,王忠锋,梁英,尚志军.分布式无线传感器网络通信协议研究[J].通信学报,2004,25(10):102-110. 被引量:120
  • 5Bertand A, SzurleyJ, Ruckebusch P, et al. Efficient calculation of sensor utility and sensor removal in wire?less sensor networks for adaptive signal estimation and beamforming[J]. IEEE Transactions on Signal Pro?cessingJournal, 2012, 60( 11) : 5857 - 5869.
  • 6Li Qianmu, HouJun, Qi Yong, et al. The rule engi?neer model on the high-speed processing of disaster warning information[J]. Disaster Advances, 2012, 5 ( 4 ) : 432 - 437.
  • 7He Shibo, ChenJiming, Peng Cheng, et al. Maintai?ning quality of sensing with actors in wireless sensor networks[J]. IEEE Transactions on Parallel and Dis?tributed SystemsJournal, 2012, 23(9): 1657 -1667.
  • 8Li Qianmu, Mao Haiyan, Zhang Hong. The design and cost analysis of DCP algorithm based on directional cir?cle[J]. InternationalJournal of Radio Frequency Iden?tification and Wireless Sensor Networks, 2012, 2 (2) : 1 -7.
  • 9Chen Siyuan, Huang Minsu, Tang Shaojie, et al. Ca?pacity of data collection in arbitrary wireless sensor net?works[J]. IEEE Transactions on Parallel and Distribu?ted SystemsJournal, 2012, 23 (1) : 52 - 60.
  • 10Ye W, HeidemannJ, Estrin D. An energy-efficient MAC protocol for wireless sensor networks[C] / / Pro?ceedings of the 21st International AnnualJoint Confer?ence of the IEEE Computer and Communications Socie?ties. New York, USA, 2002: 1567 -1576.

引证文献13

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部