期刊文献+

传感器网络中异常数据实时检测算法 被引量:8

Real-time Detection Algorithm for Anomaly Data in Sensor Networks
下载PDF
导出
摘要 如何实时检测传感器网络中异常数据是一项非常重要的工作。通过对线性自回归的分析法,给出传感器数据流的预测模型及其预测机制。当预测出现失败时,给出了一种预测模型自动调整策略,以降低预测误差。基于该预测模型,提出了一种异常数据检测方法,通过计算当前时刻的预测误差与平均预测误差的比值,比较该比值与预先设定的阈值的大小,以检测该时刻数据是否为异常数据。基于该方法,提出了异常事件检测和数据压缩处理的算法。仿真结果验证了预测模型的正确性和有效性,表明该模型能够实时检测异常事件和压缩数据处理。 Anomaly data detection is of great practical application meaning for sensor networks. Variable-self linear regression was adopted and a predictive model including its' predictive method over data stream in sensor networks was proposed. An adaptive strategy for the predictive model was proposed in order to decrease the rate of predictive errors when prediction was defected. A method of detecting anomaly data was give based on this model, which was used to detect anomaly events and compress data via computing the specific value between current prediction error and the average of prediction error. This specific value and threshold was compared for the sake of detecting whether the current data was anomaly or not .On the basis of it, an anomaly events detection and data compression algorithm was proposed. Analytical and experimental results show that this algorithm is effective in anomaly events detection and data compression.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2007年第18期4335-4338,4341,共5页 Journal of System Simulation
关键词 异常数据检测 传感器网络 异常事件 数据压缩 anomaly data detection sensors networks anomaly events data compression
  • 相关文献

参考文献14

  • 1Xiuli Ma, Dongqing Yang, Shiwei Tan, et al. Online Mining in sensors networks [C]//IFIP International Federation for Information Processing. LNCS 3222. Berlin: Springer-Verlag, 2004: 544-550.
  • 2Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong, The Design of an Acquisitional Query Processor for Sensor Networks [C]// Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2003: 491-502.
  • 3Alarcon-Aquio V, Barria J A. Anomaly detection in communication networks using wavelet [J]. IEEE proceeding-communication (S0920-6212), 2001, 148(6): 355-362.
  • 4Huang P, Feldmann A, Willinger W. A norrintrusive, wavelet-based approach to detecting network performance problems [C]// Proceedings of ACM SIGCOMM Intemet Measurement workshop, San Francisco Bay Area. New York: ACM Press, 2001.
  • 5蒋盛益,李庆华.基于引力的入侵检测方法[J].系统仿真学报,2005,17(9):2202-2206. 被引量:6
  • 6王建新,安莹,吴国政,盛羽.基于组件的实时入侵检测虚拟实验室的设计与实现[J].系统仿真学报,2006,18(11):3283-3286. 被引量:9
  • 7Andrcas Arning, Rakcsh Agrawal, Prabhakar Raghavan. A Linear Method for Deviation Detection in Large Database [C]// International conference on Knowledge Discovery and Data Mining. Portland, OR: AAAI Press, 1996: 164-169.
  • 8Markus M Breunig, Hans-Peter Kricgcl, Raymond T Ng, Jorg Sander. LOF: Identifying Density-Based Local Qutliers [C]//ACM SIGMOD International Conference, Dallas, TX, USA. New York: ACM Press, 2000: 21-32.
  • 9T Palpanas, D Panpadopoulos, V Kalogeraki, D Gunopulos. Distributed Deviation Detection in sensor Networks [J]. SIGMOD Record (S0163-5808), 2003, 32(4): 77-82.
  • 10C Guestrin, P Bodik, R Thibaux, M Paskin, S Madden. Distributed Regression: an Efficient Framework for Modeling Sensor Network Data [C]//IPSN. New York: ACM Press, 2004.

二级参考文献20

  • 1王建新,陆炜妮,王伟平.基于组件的数字图像处理仿真系统的设计与实现[J].系统仿真学报,2004,16(6):1213-1216. 被引量:23
  • 2郭龙江,李建中,王伟平,张冬冬.数据流上的连续预测聚集查询[J].计算机研究与发展,2004,41(10):1690-1695. 被引量:4
  • 3Kenji Yamanishi ,Jun-Ichi Takeuchi,Graham Williams,Peter Milne. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms[C]. In: Proceedings of the Sixth ACM SIGKDD00, Boston, MA, USA, 320-324.
  • 4Kenji Yamanishi, Jun-ichi Takeuchi. Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner[C]. In:Proceedings of the seventh ACM SIGKDD01,San Francisco, California , 2001. 389-394.
  • 5Eleazar Eskin. Anomaly detection over noisy data using learned probability distributions[C]. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML-2000), 2000. 255-262.
  • 6Portnoy L, Eskin L, Stolfo S J. Intrusion Detection with Unlabeled Data using Clustering[C]. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001). Philadelphia, PA: November 5-8, 2001.
  • 7Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy and Salvatore Stolfo. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data [M]. In Data Mining for Security Applications, Kluwer 2002.
  • 8Charles Elkan. Results of the KDD'99 Classifier Learning Contest[EB/OL].URL:http://www.cs.ucsd.edu/users/elkan/clresults.html .
  • 9Li Xiangyang. Clustering and classification algorithm for computer intrusion detection[D]. Ph.D, thesis,Arizona state university,2001.
  • 10Merz C J, Merphy P. UCI repository of machine learning databases[EB/OL]. URL: http://www.ics.uci.edu/ mlearn/ MLRRepository.html.

共引文献36

同被引文献65

引证文献8

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部