期刊文献+

基于危险理论和DCA的WSNs入侵检测系统模型 被引量:4

Intrusion detection system model for WSNs based on danger theory and DCA
下载PDF
导出
摘要 针对无线传感器网络(WSNs)由于自身特点易于遭到入侵且传统被动的安全机制无法完全应对这一问题,对人工免疫系统(AIS)进行研究,设计一种新的入侵检测系统(IDS)模型。模型采用危险理论和适用于WSNs的改良树突状细胞算法(DCA),可使节点之间彼此分工合作共同识别入侵,加强了网络的鲁棒性。仿真结果显示:与早期的自我—非我(SNS)模型相比,研究的模型在检测能力和能耗上均有很好的表现。 Aiming at the problem that WSNs is prone to different attacks due to his own features and traditional passive security mechanism can' t fully solve this problem,in order to improve the current security situation,design a new intrusion detection system (IDS) model inspired in artificial immune system (AIS).It uses danger theory and improved dendritic cell algorithm (DCA)applied in WSNs,which make nodes to execute different function and collaborate to identify intrusion,and strengthen robustness of WSNs.Simulation results shows that compared with self-nonself(SNS) model,the new IDS model is better in detecting capacity and energy consumption.
出处 《传感器与微系统》 CSCD 北大核心 2014年第4期102-105,共4页 Transducer and Microsystem Technologies
基金 国家自然科学基金重点资助项目(61262074)
关键词 无线传感器网络 入侵检测系统 人工免疫系统 危险理论 树突状细胞算法 WSNs intrusion detection system(IDS) artificial immune system(AIS) danger theory dendritic cell algorithm (DCA)
  • 相关文献

参考文献8

  • 1Twycross J. Immune systems, danger theory and intrusion detec- tion[ C]//Proc of the AISB Symposium on Immune Systems and Cognition ,2004:40 -42.
  • 2Aickelin U, Greensmith J, Twycross J. Immune system approaches to intrusion detection-A review (ICARIS) [ EB/OL ]. [ 2013- 05-30 ]. http://arxiv, org/abs/1305. 7144.
  • 3Matzinger P. Tolerance, danger, and the extended family [ J ]. Annual Review of Immunology,1994,12 (1) :991 -1045.
  • 4Greensmith J, Aickelin U, Twycross J. Detecting danger: Applying a novel immunological concept to intrusion detection systems [ EB/OL]. [2010-02-031. http://arxiv, org/abs/1002. 0696.
  • 5Greensmith J, Aiekelin U. The deterministic dendritie cell algo- rithm[ J]. Artificial Immune Systems,2008,5132:291 -302.
  • 6Drozda M, Sehaust S, Szezerbicka H. AIS for misbehavior detee- tion in wireless sensor networks:Performanee and design prinei- ples [ C ]//Proceedings of 2007 IEEE Cono'ess on Evolutionary Computation ,2007:3719 -3726.
  • 7Wallenta C, Kim J, Bentley P J, et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorith- m[ J]. Applied Intelligence ,2010,32 ( 1 ) : 1 -26.
  • 8Gareia-Teodoro P, Diaz-Verdejo J, Macir-Fernandez G, et al. A- nomaly-based network intrusion detection: Techniques, systems and challenges [ J ]. Computers & Security, 2009,28 ( 1 ) : 18 - 28.

同被引文献50

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部