期刊文献+

基于链路覆盖的无线Mesh网络入侵检测方法 被引量:6

Research on Intrusion Detection for WMN Based on Link-Coverage
原文传递
导出
摘要 针对传统入侵检测方法不适用于资源受限的无线Mesh网络(WMN)的问题,提出一种基于链路覆盖的分布式入侵检测(LCDID)方法.该方法将WMN中所有节点纳入到入侵检测中,节点根据自身内存阈值加载入侵检测系统功能模块,并采用协调优化机制优化节点对功能模块加载,每条通信链路可由多个节点覆盖检测.仿真实验结果表明,LCDID方法对不同规模的网络具有较好的适应性和可扩展性;与现有检测方法相比,该方法具有更高的内存利用率和入侵检测率. In order to solve the problem that the traditional intrusion detection methods are not suitable for resource-limited wireless Mesh network( WMN),a link-coverage based distributed intrusion detection method( LCDID) was presented. LCDID requires all nodes in WMN to participate in intrusion detection,each node loads detection modules by the memory threshold,and adopts the coordinated optimization mechanism to optimize the loading modules for nodes,each communication link can be detected by multiple monitoring nodes. Experiment shows that LCDID has good adaptability and expansibility to different scale networks,and it has higher memory utilization and detection rate comparing with existing methods.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2015年第6期60-64,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家科技重大专项基金项目(2012ZX03002002) 国家自然科学基金项目(60776807 61179045) 中国民航科技基金项目(MHRD201009 MHRD201205) 中央高校基本科研业务费专项资金项目(3122014D033)
关键词 无线MESH网络 入侵检测 资源受限 链路覆盖 协调优化机制 wireless Mesh networks intrusion detection resource-limited link-coverage coordinated optimization mechanism
  • 相关文献

参考文献6

  • 1Hassanzadeh A, Xu Zhaoyan, Stoleru R, et al. PRIDE: practical intrusion detection in resource constrained wire- less mesh networks [ C ] //Information and Communica- tions Security, Lecture Notes in Computer Science. Ber- lin, Germany: Springer Verlag, 2013: 213-228.
  • 2Shin D, Bagchi S, Wang Chunchi. Distributed online channel assignment toward optimal monitoring in multi- channel wireless networks [ C ] // Proceedings of IEEE Conference on Computer Communications (INFO COM). Piscataway, NJ: IEEE, 2012: 2626-2630.
  • 3Hassanzadeh A, Stoleru R, Shihada B. Energy efficient monitoring for intrusion detection in battery-powered wire- less mesh networks[ C ]//Proceedings of the 10th Interna- tional Conference on Ad Hoc Networks and Wireless. Berlin, Germany: Springer Verlag, 2011: 44-57.
  • 4Morais A, Cavalli A. A distributed and colla-borative in- trusion detection architecture for wireless mesh networks [ J]. Mobile Networks and Ap pications, 2014, 19: 101- 120.
  • 5Liu Changlei, Cao Guohong. Distributed monitoring and aggregation in wireless sensor networks [ C ] // Proceedings of IEEE Conference on Computer Communications. Pisca- taway, NJ: IEEE Press, 2010: 1-9.
  • 6牛玲,郭渊博,刘伟.基于流量的无线Mesh网跨层异常检测方法[J].计算机工程,2012,38(22):88-91. 被引量:1

二级参考文献8

  • 1Raghavendra R. Acharya P, Belding E, et al. A Multi-tiered Framework for Wireless Mesh Networkmonitoring[C]//Proc. of 2009 MobiHoc S3 Workshop. New York, USA: ACM Press, 2009: 134-138.
  • 2Harkins S, He H, Willams G J, et al. Outlier Detection Using Replicator Neural Networks[C]//Proc. of the 4th International Conference on Data Warehousing and Knowledge Discovery. London, UK: Springer Verlag, 2009:170-180.
  • 3Chen Qiuxia, Chen Lei. Indexable PLA for Efficient Similarity Search[C]//Proc. of VLDB'07. New York, USA: ACM Press, 2007 435-446.
  • 4Wu Y L, Agrawal D, Abbadi A E. Acomparison of DFT and DWT Based Similarity Search in Time Series Databases[C]//Proc. of CIKM'I0. New York, USA: ACM Press, 2010: 488-495.
  • 5David S B, Gehrke J, Kifer D. Detecting Change in Data Stream[C]//Proc. of VLDB'09. San Fransisco, USA: [s. n.], 2009: 180-191.
  • 6曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 7李晓光,宋宝燕,张昕.基于滑动多窗口的时间序列流趋势变化检测[J].电子学报,2010,38(2):321-326. 被引量:14
  • 8党小超,郝占军.基于改进Elman神经网络的网络流量预测[J].计算机应用,2010,30(10):2648-2652. 被引量:32

同被引文献63

  • 1Anne-Marie Kermarrec,Erwan Le Merrer,Bruno Sericola,Gilles Trédan.??Second order centrality: Distributed assessment of nodes criticity in complex networks(J)Computer Communications . 2010 (5)
  • 2Frank A. Zdarsky,Sebastian Robitzsch,Albert Banchs.??Security analysis of wireless mesh backhauls for mobile networks(J)Journal of Network and Computer Applications . 2010 (2)
  • 3Szott S.Selfish insider attacks in ieee 802.11s wireless mesh networks. IEEE Communications Magazine . 2014
  • 4Butun,I,Morgera,S.D.,Sankar,R.'A Survey of Intrusion Detection Systems in Wireless Sensor Networks,'. Communications Surveys & Tutorials,IEEE . 2014
  • 5Okechukwu E. Muogilim,Kok-Keong Loo,Richard Comley.Wireless mesh network security: A traffic engineering management approach. Journal of Network and Computer Applications . 2011
  • 6Chen W,Yuan Y,Zhang L.Scalable influence maximization insocial networks under the linear threshold model. The 2010IEEE International Conference on Data Mining (ICDM) . 2010
  • 7N. Deb,M. Chakraborty,N. Chaki.The Evolution of IDS Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks. Network Security & Applications . 2011
  • 8Yao Yu,Lei Guo,Xingwei Wang,Cuixiang Liu.??Routing security scheme based on reputation evaluation in hierarchical ad hoc networks(J)Computer Networks . 2009 (9)
  • 9Zorana Bankovic,David Fraga,José Manuel Moya,Juan Carlos Vallejo,Pedro Malagón,álvaro Araujo,Juan-Mariano de Goyeneche,Elena Romero,Javier Blesa,Daniel Villanueva,Octavio Nieto-Taladriz.??Improving security in WMNs with reputation systems and self-organizing maps(J)Journal of Network and Computer Applications . 2010 (2)
  • 10Yao Yu,Yuhuai Peng,Yinpeng Yu,Tianyu Rao.??A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks(J)Computers and Electrical Engineering . 2014 (2)

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部