期刊文献+

基于免疫网络的RFID入侵检测模型研究 被引量:5

Intrusion detection model for RFID system based on immune network
下载PDF
导出
摘要 针对无线射频识别技术(RFID)的加密认证等安全策略在廉价标签上的局限性,采用入侵检测作为RFID系统的新型安全策略,通过分析RFID系统的典型安全攻击,基于人工免疫网络,提出了入侵特征提取方法和入侵分析方法,建立了一个自适应的RFID入侵检测模型。该模型在不需要修改RFID已有技术标准的前提下,与加密认证等已有安全策略互补提升RFID系统的安全防护能力。试验证明该模型具有极低的误检率和漏检率。 It is very hard to develop encryption technology used in cheap Radio Frequency Identification (RFID) tags. In this paper, intrusion detection, as a new methodology, was adopted to create security model for RFID system. By analyzing typical security attacks on RFID systems, and based on artificial immune network, a solution to extract intrusion characteristics and to identify intrusion was proposed, A self-adaptive intrusion detection model for RFID system was designed. The model can enhance the defense capabilities of RFID systems by cooperating with encryption technology, but has no need to amend the technical standards of RFID. Stimulation results prove that the mistake rate and miss rate of the model are fairly low.
出处 《计算机应用》 CSCD 北大核心 2008年第10期2481-2484,共4页 journal of Computer Applications
基金 广东省工业科技攻关计划项目(2007B010200046) 教育部高校博士点基金项目(20070561081)
关键词 无线射频识别 入侵检测 免疫网络 Radio Frenquency IDentification (RFID) intrusion detection immune network
  • 相关文献

参考文献7

  • 1JUELS A. RFID security and privacy: A research survey[J]. IEEE Journal of Selected Areas in Communications, 2006, 24(2): 381 - 392.
  • 2于宇,杨玉庆,闵昊.RFID标签的安全建模及对EPCC1G2协议的改进[J].小型微型计算机系统,2007,28(7):1339-1344. 被引量:8
  • 3FORREST S, PERELSON A S, ALLEN L, et al. Self-nonself discrimination in a computer[ C]// Proceeding IEEE Symposium on Research in Security and Privacy. Washington, DC: IEEE Computer Society, 1994:202 -212.
  • 4徐慧,刘凤玉.多特征融合的入侵检测[J].计算机工程,2004,30(15):103-105. 被引量:10
  • 5FORREST S, HOFMEYR S A, SOMAYAJIETAL A. A sense of self for Unix processes[ C]// Proceedings of the IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:120 - 128.
  • 6de CASTRO L N, Von ZUBEN F J. An evolutionary immune network for data clustering[ C]//Proceedings of Sixth Brazilian Symposium on Neural Networks. Washington, DC: IEEE Computer Society, 2000:84-89.
  • 7李洁,高新波,焦李成.基于克隆算法的网络结构聚类新算法[J].电子学报,2004,32(7):1195-1199. 被引量:24

二级参考文献31

  • 1[1]Didaci L, Giacinto G, Roli F. Ensemble Learning for Intrusion Detection in Computer Networks. www.dii. ing.unist.it/aiia2002/paper/APAUT/Abstract/didact-aiia02.pdf, 2003-3-20
  • 2[2]Duda R, Hart P, Stork D G. Pattern Classification. John Wiley & Sons, 2001
  • 3[4]Stephen Northcutt, Mark Cooper, Matt Fearnow. lntrusion Signatures and Analysis[M]. 北京: 中国电力出版社, 2002-09
  • 4[7]Kittler J, Hatef M, Duin R P W,et al. An Combining Classifiers?. IEEE Trans, on Pattern Analysis and Machine Intelligence, 1998,20(3): 226
  • 5[8]Xu L., Krzyak A, Suen C Y. Mechods for Combining Multiple Classifiers and Their Applications to Handwriting Recognition[J]. IEEE Trans. Systems, Man and Cybernetics, 1992, 22:418-435
  • 6Bezdek J C.Patten Recognition with Fuzzy Objective Function Algorithms[M].New York:Plenum Press,1981.
  • 7Dave R N,Bhaswan K.Adaptive fuzzy c-shells clustering and detection of ellipses[J].IEEE Trans NN,1992,3(5):643-662.
  • 8Krishnapuram R,Frigui H,Nasraoni O.Fuzzy and possiblistic shell clustering algorithms and their application to boundary detection and surface approximation-Part I[J].IEEE Trans FS,1995,3(1):29-43.
  • 9William H H,Loretta S A,William M P,David T,Michael W.Self-Organizing Systems for Knowledge Discovery in Large Databases[OL].http://www.kddresearch.org/Publications/Conference/HAPTW1.pdf
  • 10Leandro N C,Fernando J Z.An evolutionary immune network for data clustering[A],Proceedings of the IEEE Computer Society Press[C].USA:IEEE Press,2000.84-89.

共引文献39

同被引文献22

引证文献5

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部