期刊文献+

无线传感器网络分级入侵检测模型 被引量:6

A Hierarchical Intrusion Detection Model in Wireless Sensor Networks
原文传递
导出
摘要 针对无线传感器网络中的攻击,提出一种无线传感器网络的两级入侵检测模型.采用主成分分析法进行特征降维,降低数据存储量和计算量;簇级中普通节点采用K近邻直推式信度机进行异常检测,簇头采用粒子群优化参数的支持向量机对检测到的异常进行进一步误用检测分类,保障节点安全;基站级将异常检测技术与误用检测技术相结合,处理簇头提交的监测数据,可同时提高检出率和降低误报率,保障簇头安全.仿真结果显示本文算法在小样本情况下能够提高检测正确率. A two-level intrusion detection model of wireless sensor networks (WSNs) is proposed to detect the attacks in WSNs. The principal component analysis is adopted to reduce the feature dimension and the complexity of data storage and computation. In the cluster level, for the security of sensors, normal sensor nodes employ the transductive confidence machines for K-nearest neighbors for anomaly detection, and cluster heads use the support vector machine based on particle swarm parameters optimization to classify the misuse detections for the detected anomaly data. In the base station level, for the security of cluster heads, the anomaly detection and misuse detection technologies are combined to deal with the moni- toring data delivered by cluster heads, which improves the detection probability while preserving low false alarm probability. Simulation results show that the proposed detection algorithm can improve the accuracy of detection even in the case of small samples.
出处 《信息与控制》 CSCD 北大核心 2013年第6期670-676,共7页 Information and Control
基金 国家自然科学基金资助项目(61373126) 江苏省自然科学基金资助项目(BK20131107)
关键词 无线传感器网络 分级入侵检测 K近邻直推式信度机 粒子群优化 支持向量机 wireless sensor network hierarchical intrusion detection transductive confidence machine for K-nearest neighbors particle swarm optimization support vector machine
  • 相关文献

参考文献15

  • 1Tan D Z, Jing N S, Shi Z, et al. Research on encrypt algo- rithm apply in WSN[J]. Advanced Materials Research, 2012, 433-440: 4625-4629.
  • 2Bechkit W. New key management schemes for resource con- strained wireless sensor networks[C]//Proceedings of 2011 In- ternational Symposium on a World of Wireless, Mobile and Multimedia Networks. Piscataway, NJ, USA: IEEE, 2011: 1-3.
  • 3王秋华,陈惠芳,谢磊,王匡.传感器网络中建立路径密钥的增强方案[J].信息与控制,2011,40(2):268-272. 被引量:1
  • 4Mainivannan D, Vijayalashmi B, Neellamegam R An efficient authentication protocol based on congruence for wireless sen- sor networks[C]//Proceedings of 2011 International Conference on Recent Trends in Information Technology. Piscataway, NJ, USA: IEEE, 2011: 549-554.
  • 5Li W, Chen M, Li M M. Information security routing protocol in the WSN[C]//Proceedings of Fifth International Conference on Information Assurance and Security. Piscataway, NJ, USA: IEEE, 2009: 651-656.
  • 6Misra S, Krishna V, Abraham I. A simple learning automata- based solution for intrusion detection in wireless sensor net- works[J]. Wireless Communications and Mobile Computing, 2011(11): 426-441.
  • 7Rassam M A, Maarof M A, Zainal A. A novel intrusion detec- tion framework for wireless sensor networks[C]//Proceedings of 7th International Conference on Information Assurance and Se- curity. Piscataway, NJ, USA: IEEE, 2011: 350-353.
  • 8祝琦,宋如顺,姚永仙.无线传感器网络中基于SVM的合作型入侵检测系统[J].计算机应用研究,2010,27(4):1489-1492. 被引量:6
  • 9吴涛,温巧燕,张华.无线传感器网络中的一种基于移动Agent的动态入侵检测系统(英文)[J].软件,2011,32(6):93-96. 被引量:4
  • 10Wang S S, Yan K Q, Wang S C, et al. An integrated intrusion detection system for cluster-based wireless sensor networks[J]. Expert Systems with Application, 2011, 38(12): 15234-15243.

二级参考文献29

  • 1李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 2诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:56
  • 3王伟东,朱清新.无线传感器网络中一种层次分簇算法及协作性分析(英文)[J].软件学报,2006,17(5):1157-1167. 被引量:21
  • 4DOUMIT S,AGRAWAL D P.Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network[C]//Proc of the IEEE Military Communications Conference.2003:609-614.
  • 5AGAH A,DAS S,BASU K,et al.Intrusion detection in sensor networks:a non-cooperative game approach[C]//Proc of the 3rd IEEE International Symposium on Network Computing and Applications.2004:343-346.
  • 6SILVA A,MARTINS M,ROCHA B,et al.Decentralized intrusion detection in wireless sensor networks[C]//Proc of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks.2005:16-23.
  • 7LIU F,CHENG X,CHEN D.Insider attacker detection in wireless sensor networks[C]//Proc of the 26th IEEE International Conference on Computer Communications.2007:1937-1945.
  • 8LI Guo-rui,HE Jing-sha,FU Ying-fang.Group-based intrusion detection system in wireless sensor networks[J].Computer Communications,2008,31(18):4324-4332.
  • 9VAPNIK V N.Statistical learning theory[M].New York:Wiley,1998:16-31.
  • 10WANG Yu-guo.A tree-based multi-class SVM classifier for digital library document[C]//Proc of the International Conference on MultiMedia and Information Technology.2008:15-18.

共引文献32

同被引文献74

  • 1吴旗,刘健男,寇文龙,张宗升.改进的单类支持向量机的网络流量检测[J].吉林大学学报(工学版),2013,43(S1):124-127. 被引量:3
  • 2谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 3黄谦,王震,韦韬,陈昱.基于One-class SVM的实时入侵检测系统[J].计算机工程,2006,32(16):127-129. 被引量:13
  • 4Patel S C,Sanyal P.Securing SCADA systems[J].Information Management & Computer Security,2008,16(4):398-414.
  • 5Igure V M,Laughter S A,Williams R D.Security issues in SCADA networks[J].Computers & Security,2006,25(7):498-506.
  • 6Morris T,Srivastava A,Reaves B,et al.A control system testbed to validate critical infrastructure protection concepts[J].International Journal of Critical Infrastructure Protection,2011,4(2):88-103.
  • 7Zhu B,Sastry S.SCADA-specific intrusion detection/prevention systems:a survey and taxonomy[C] //Proc of the 1st Workshop on Secure Control Systems.2010:1-16.
  • 8Papa S M.A behavioral intrusion detection system for SCADA systems[D].Dallas:Southern Methodist University,2013.
  • 9Garcia-Teodoro P,Diaz-Verdejo J,Maciá-Fernández G,et al.Anomaly-based network intrusion detection:techniques,systems and challenges[J].Computers & Security,2009,28(1):18-28.
  • 10Park Y.A statistical process control approach for network intrusion detection[D].Atlanta:Georgia Institute of Technology,2005.

引证文献6

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部