期刊文献+

基于有限自动机的RFID入侵检测 被引量:4

RFID Intrusion Detection with Finite Automation
下载PDF
导出
摘要 利用RFID中间件的特点,加入入侵检测异常检测模块,通过对入侵者的攻击数据流与RFID系统内部的数据流进行对比后提取特征向量,并通过对入侵数据流对应子模块的归纳建立有限自动机,对有限自动机的归并来提高系统入侵检测的效率。此外,参照归并后的有限自动机对攻击进行分类,通过对攻击本质的分析与提取来检测一部分入侵检测自动机里没有相应的攻击。最后,对固定攻击比例的访问事件样本乱序进行试验,试验结果表示系统在3轮测试中均得到稳定的检测率。 Based on the characteristics of RIFD middleware, the paper adds an intrusion detection system in RFID middleware to gather the feature vector from the comparison between intrusion data stream with RIFD internal data stream and establish finite automation according to intrusion data steam corresponding to sub-module. The efficiency of the intrusion detection system is improved via the consolidation of some of finite automation. Besides, the proposed system can achieve the classification of RFID attacks from finite automation, and even detect some unknown attacks through analyzing the nature of the attacks. By randomizing the order of access events which has mixed attack events in fixed proportion, the system can achieve stable detection rates in 3 rounds tests.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2014年第5期775-780,共6页 Journal of University of Electronic Science and Technology of China
基金 中央高校基本科研业务费(ZYGX2011J066) 四川省科技支撑计划(2013GZ0022) 国家自然科学基金(61003230) 新疆教育厅教育科学研究项目(XJEDU2013I28)
关键词 攻击分类 有限自动机 入侵检测 RFID attack classification finite automation intrusion detection RFID
  • 相关文献

参考文献12

  • 1VAN DEURSEN T, RADOMIROVI( S. Algebraic attacks on RFID protocols[C]//Proceedings of the Third IFIP WG 11.2 International Work Shop on Information Security Theory and Practice. Smart Devices: Pervasive Systems, and Ubiquitous Networks. Berlin: Springer, 2009: 38-51.
  • 2MITROKOTSA A, R1EBACK M R, TANENBAUM A S. Classifying RFID attacks and defenses[J]. Information Systems Frontiers, 2010, 12(5): 491-505.
  • 3FU Y, ZHANG C, WANG J. A research on denial of service attack in passive RFID system[C]//Anti-Counterfeiting Security and Identification in Communication (ASID), 2010 International Conference on. [S.l.]: IEEE, 2010: 24-28.
  • 4VAN DEURSEN T, RADOMIROVIC S. Attacks on RFID protocols[EB/OL]. (2008-07-12). http://eprint.iacr.org/2008/ 310.
  • 5JUELS A. RF1D security and privacy: a research survey[J]. Selected Areas in Communications, IEEE Joumal on, 2006, 24(2): 381-394.
  • 6VASILIADIS t ANTONATOS S, POLYCHRONAKIS M, et al. Gnort: High performance network intrusion detection using graphics processors[C]//Recent Advances in Intrusion Detection. Berlin: Springer, 2008.
  • 7单征,刘铁铭,楚蓓蓓.基于网络状态的入侵检测模型[J].信息工程大学学报,2002,3(3):9-14. 被引量:5
  • 8THAMILARASU G SRIDHAR R. Intrusion detection in RFID systems[C]//Military Communications Conference. [S.1.]: IEEE, 2008.
  • 9郭建华,杨海东,邓飞其.基于免疫和多Agent的RFID入侵检测模型研究[J].计算机工程与应用,2009,45(35):94-98. 被引量:2
  • 10M1ROWSKI L, HARTNETT J. Deckard: a system to detect change of RFID tag ownership[J]. International Journal of Computer Science and Network Security, 2007, 7(7): 89-98.

二级参考文献56

  • 1于宇,杨玉庆,闵昊.RFID标签的安全建模及对EPCC1G2协议的改进[J].小型微型计算机系统,2007,28(7):1339-1344. 被引量:8
  • 2高仲仪 金茂忠.编译原理及编译程序构造[M].北京:北京航空航天大学出版社,1999..
  • 3龚俭 陆晟 等.计算机网络安全导论[M].南京:东南大学出版社,1999..
  • 4Juels A.RFID Security and privacy:A research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-392.
  • 5Steven A H.An Interpretative Introduction to the Immune System. [EB/OL].(2007 ).http://www.cs.unm.edu/-steveah/imm-overview-new.pdf.
  • 6Timmis J.Artificial immune systems:a novel data analysis technique inspired by the immune network theory[D].Wales:University of Wales ,2000.
  • 7Kinny D,Georgeff M,Rao A.A methodology and modeling technique for systems of BDI agents[C]//Van de Velde W,Perram J W. LNAI 1038:Proceedings of the Seventh European Workshop on Modeling Autonomous Agents in a Multi-Agent World.Berlin, Germany: Springer-Verlag : 1996 : 56-71.
  • 8Wooldridge M.Intelligence agent[M]//Weiss G.Multi-agent system:A modem approach to Distributed Artificial Intelligence.[S.l.]:MIT Press, 1999 : 27-78.
  • 9de Castro L N,Von Zuben F J.An evolutionary network for data clustering[C]//Proceedings 6th Brazilian Symposium on Neural Networks, 2000: 84-89.
  • 10Forrest S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[C]//Proceeding IEEE Symposium on Research in Security and Privacy,1994:202-212.

共引文献236

同被引文献15

  • 1闫莺,金澈清,曹锋,汪恒杰,周傲英.多数据流上共享窗口连接查询的降载策略[J].计算机研究与发展,2004,41(10):1836-1841. 被引量:4
  • 2施化吉,周书勇,李星毅,唐慧,丁秋林.基于平均密度的孤立点检测研究[J].电子科技大学学报,2007,36(6):1286-1288. 被引量:11
  • 3MAHDIN H,ABAWAJY J.An approach for removing redundant data from RFID data streams[J].Sensors, 2011, 11 (10) : 9863 -9877.
  • 4FERNANDO H, ABAWAJY J.Securing RFID systems from SQEIA[C].Algorithms and architectures for parallel processing.Springer Berlin Heidelberg.2011 : 245-254.
  • 5ABAWAJY J.SQLIA detection and prevention approach for RFID systems[J].Journal of Systems and Software,2013,86 (3) : 751-758.
  • 6DOGBE E,MILLHAM R,SINGH P.A combined approach to prevent SQL injection attacks[C].Science and Information Conference (SAI), 2013. IEEE, 2013 : 406- 410.
  • 7ABAWAJY J,FERNANDO H.Policy-based SQLIA detection and prevention approach for RFID svstems[J].Computer Standards & Interfaces, 2015,38(3) : 64-71.
  • 8LEE I,JEONG S,YEO S,et al.A novel method for SQL injection attack detection based on removing SQI, query attribute values[J].Mathematical and Computer Modelling, 2012,55(1):58-68.
  • 9田芸,陈恭亮,李建华.针对RFID身份认证协议——ARAP协议的攻击及改进[J].中国电子科学研究院学报,2011,6(6):556-560. 被引量:6
  • 10白婷,黄春明,李楠,张东亮,张莹.基于RFID的局域网安全管理的研究[J].计算机测量与控制,2012,20(4):1067-1069. 被引量:3

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部