期刊文献+

分布式入侵检测系统的融合算法

Fusion algorithm for distributed intrusion detection systems in wireless sensor networks
原文传递
导出
摘要 提出了无线传感器网络(WSN)中一种防御攻击的分布式入侵检测系统,包括以数据采集、处理和传输为目的的3层分层的体系结构和基于异常的分布式入侵检测算法.本地入侵检测系统(IDS)依附于WSN的每一个节点,其作用是采集网络运行的原始数据,以及计算本地异常指数,以此衡量当前节点的运行与正常运行情况之间的差别.在簇头和管理节点两个层次中进行异常指数的融合,分别形成簇级和网络级的异常指数.对融合算法进行了数学描述和理论推导,通过仿真并借助接受者操作特性(ROC)曲线,对节点、簇头和管理节点的运行情况进行了性能评估,总体结果证实了体系结构和算法的有效性.研究表明,这种融合算法能大幅提高系统的检测概率. A distributed intrusion detection system against attacks in wireless sensor networks (WSN) was presented, including a three-level hierarchical architecture for data collection, processing and transmission. A distributed anomaly-based intrusion detection algorithm was also proposed, Local IDS (intrusion detection systems) were attached to each node of the WSN, which were responsible for collecting raw data of network operation, and computing a local anomaly index, measuring the difference between the current node operation and normal operation. In this hierarchical system, node-level and cluster-level anomaly index were fused, producing cluster-level and network-level anomaly index respectively. The fusion algorithm was described mathematically and deduced theoretically. For performance evaluation,the ROC (receiver operating characteristics) curves in simulation, for operations at the nodes, cluster heads and managers,was adop ed. The overall results confirm the effectiveness of the architecture and algorithm described in the paper. Research shows that the fusion algorithm can greatly improve system's probability of detection.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第9期49-52,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 教育部985重点工程资助项目
关键词 无线传感器网络 分布式入侵检测系统 融合算法 体系结构 异常 接受者操作特性 wireless sensor networks distributed intrusion detection systems fusion algorithm architecture anomaly receiver operating characteristics (ROC)
  • 相关文献

参考文献12

  • 1Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. CACM, 2004, 47: 53-57.
  • 2Anjum F, Subhadrabandhu D, Sarkar S, et al. On optimal placement of intrusion detection modules in sensor networks[C]//1st International Conference on Broadband Networks. Washington: IEEE Press, 2004 : 433-439.
  • 3Bandyopadhyay S, Giannella C, Maulik U, et al. Clustering distributed data streams in peer-to-peer environments[J]. Information Sciences, 2006, 176 (14): 1 952-1 985.
  • 4Onat I, Miri A. An intrusion detection system for wireless sensor networks [J]. Wireless and Mobile Computing Networking and Communications, 2005, 3: 253-259.
  • 5Cabrera J B D, Ravichandran B, Mehra R K. Statistical traffic modeling for network intrusion detection [C]//Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems. San Francisco: IEEE Computer Society, 2000: 466-473.
  • 6刘莘,张永平,万艳丽.决策树算法在入侵检测中的应用分析及改进[J].计算机工程与设计,2006,27(19):3641-3643. 被引量:27
  • 7Szewczyk R, Mainwaring A, Polastre J, et al. An analysis of a large scale habitat monitoring application [C] // International Conference on Embedded Networked Sensor Systems. Los Angeles: ACM Press, 2004:214-226.
  • 8Qin X, Lee W, Lewis L, et al. Integrating intrusion detection and network management[C]//Proceedings of the Eighth IEEE/IFIP Network Operations and Management Symposium. Florence:[s. n. ], 2002: 329-344.
  • 9Cabrera J B D, Guti'errez C, Mehra R K. Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile adhoc networks[C]// Military Communications Conference. Monterey: IEEE Computer Society, 2005:1 831-1 837.
  • 10Da Silva A P R, Loureiro A A F, Martins M H T, et al. Decentralized intrusion detection in wireless sensor networks [C]// International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems. Cincinnati, Ohio: [s. n.], 2005: 680-683.

二级参考文献13

  • 1张雪芹,顾春华,林家骏.入侵检测技术的挑战与发展[J].计算机工程与设计,2004,25(7):1096-1099. 被引量:14
  • 2姚家奕,姜海,王秦.决策树算法的系统实现与修剪优化[J].计算机工程与设计,2002,23(8):75-77. 被引量:11
  • 3李玲娟.基于数据挖掘的Snort增强模型的研究[J].南京邮电学院学报(自然科学版),2004,24(4):1-5. 被引量:3
  • 4张银奎.数据挖掘原理[M].北京:机械工业出版社,2003..
  • 5Andreas Wespi,Giovanni Vigna,Luca Deri.5th international symposium[C].New York:RAID 2002,Berlin Heidelberg:Springer-Verlag,2002.
  • 6Heinzelman W, Chandrakasan A. An application-specific protocol architecture for wireless microsensor networks[J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
  • 7Cruz R L, Santhanam. Optimal routing, link scheduling and power control in multihop wireless networks[C]// Proceeding of IEEE INFOCOM 2003. San Francisco: IEEE Press, 2003: 702-711.
  • 8Rappaport T S. Wireless communications principles and practice[M]. Upper Saddle River: Prentice Hall Inc, 1996.
  • 9Ecker J G. Geometric programming:methods, computations and applications[J]. Society of Industrial and Applied Mathematics Review, 1980, 22(3): 338- 362.
  • 10Mhatre V, Rosenberg C. Design guidelines for wireless sensor networks: communication, clustering and aggregation[J]. Ad Hoc Network Journal, 2004, 2(1) : 45-63.

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部