期刊文献+

基于机器学习的移动自组织网络入侵检测方法 被引量:3

Intrusion detection method for mobile ad-hoc networks based on machine learning
下载PDF
导出
摘要 移动自组织网络是由无线移动节点组成的复杂分布式通信系统。研究了移动自组织网络的入侵检测问题,采用了一种新型的基于机器学习算法的异常入侵检测方法。该方法获取正常事件的内部特征的相互关系模式,并将该模式作为轮廓检测异常事件。在Ad-hoc按需距离向量协议上实现了该方法,并在网络仿真软件QualNet中对其进行了评估。 Mobile ad-hoc networks (MANETs) represent complex distributed communication systems comprised of wireless mobile nodes. Based on the discussion of intrusion detection problem in MANET, a novel anomaly intrusion detection method based on machine learning algorithm was proposed to detect attacks on MANET. The method captured the normal traffic's inter-feature correlation pattern which could be used as normal profiles to detect anomalies caused by attacks. The method was implemented on Ad-hoc On-Demand Distance Vector (AODV) protocol and evaluated in QualNet, a leading network simulation software.
出处 《计算机应用》 CSCD 北大核心 2005年第11期2557-2558,2576,共3页 journal of Computer Applications
关键词 移动自组织网络 异常入侵检测 机器学习 mobile ad-hoc networks, anomaly intrusion detection, machine learning
  • 相关文献

参考文献5

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2PERKINS CE, ROYER EM. Ad-hoc on demand distance victor routing[A]. The IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) [C]. New Orleans, LA, 1999.
  • 3HUANG Y-A, LEE W. A Cooperative Intrusion Detection System for Ad Hoc Networks[A]. Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks [C]. Fairfax, Virginia, 2003.
  • 4QUINLAN JR. Induction of Decision Trees[J]. Machine Learning, 1986, (1): 81-106.
  • 5Scalable Network Technologies [EB/OL]. http://www.qualnet.com, 2005-03-10.

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献230

同被引文献13

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部