期刊文献+

非均匀噪声环境下网络小扰动入侵源定位检测方法研究 被引量:1

Design of Intrusion Detection System for Intrusion Detection System with Small Disturbance
下载PDF
导出
摘要 非均匀噪声环境下网络小扰动数据入侵具有信号振幅小、攻击性强等特点,传统方法对小扰动入侵检测准确率低、漏报率高,不能对小扰动入侵源进行准确的定位和检测。提出一种基于生物免疫学的入侵源定位检测系统设计,搭建适用于非均匀噪声环境下网络小扰动入侵检测的软硬件平台,对输入检测系统的数据进行预处理,模拟生物免疫系统信息处理机制,通过不断更新规则库识别出"友好"数据和"非友好"数据,最后进行亲和力计算和数据匹配,实现非均匀噪声环境下网络小扰动入侵源定位和检测。通过仿真试验证明提出的方法能够有效地完成对小扰动入侵源的定位和检测。 In the non uniform noise environment, the intrusion of small disturbance data in the network has the characteristics of small signal amplitude, strong attack and so on,the traditional method of disturbance intrusion de-tection of low accuracy, high failure rate of small, the accurate localization and detection of the small disturbance source can not be carried out. A design of intrusion detection system based on biological immune system is presen-ted, the software and hardware platform for the intrusion detection of small disturbance in the environment of non uniform noise is set up, preprocessing the data of input detection system, information processing mechanism of simu-lated biological immune system, by constantly updating the rule base to identify the “friendly” data and “non friendly^ data,Finally, affinity calculation and data matching,localization and detection of small disturbance intru-sion in the environment of non uniform noise. Through simulation experiment, the proposed method can effectively accomplish the localization and detection of small disturbance intrusion sources.
作者 蒋帅 罗天鑫
出处 《科学技术与工程》 北大核心 2017年第5期247-251,共5页 Science Technology and Engineering
基金 河南省高等学校重点科研项目(15B520036)资助
关键词 非均匀噪声环境下网络小扰动 生物免疫 入侵源定位检测 heterogeneous network small disturbance in noise environment biological immune intrusion detection
  • 相关文献

参考文献4

二级参考文献51

  • 1张红斌,杨超,马建峰.基于邻接信任的路由安全评估[J].吉林大学学报(工学版),2009,39(2):440-445. 被引量:3
  • 2陈小平.电力调度数据网的建设[J].电力系统通信,2004,25(10):1-4. 被引量:25
  • 3薄翠梅,张湜,王执铨,李俊.基于滑动时间窗的支持向量机软测量建模研究[J].自动化仪表,2006,27(1):45-48. 被引量:14
  • 4李章林,张立民.TCP/IP在51单片机上的实现特点和方法[c]//2003年全国单片机及嵌入式系统学术年会论文集(上册).2003:380-384.
  • 5苏锦秀,杨庆江,张广璐.以太网控制芯片RTL8019AS详细配置[J].现代电子技术,2007,30(22):151-153. 被引量:8
  • 6Jhaveri R H,Patel S J,Jinwala D C.A novel approach for grayhole and blackhole attacks in mobile ad hoc networks.Advanced Computing & Communication Technologies (ACCT),2012 Second International Conference on.IEEE,2012:556-560.
  • 7Wang S S,Yan K Q,Wang S C.An optimal solution for byzantine agreement under a hierarchical cluster-oriented mobile ad hoc network.Computers & electrical Engineering,2010; 36 (1):100-113.
  • 8Bohara B,Sharma V.Analysis and prevention of effects of gray hole attacks on routing protocol in mobile ad-hoc networks.Analysis,2013; 2(6):2468-2472.
  • 9钱聪.移动自组织网络中基于信任和能量综合评价的路由机制研究.武汉:华中科技大学,2012.
  • 10Su M Y.Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems.Computer Communications,2011; 34(1):107-117.

共引文献69

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部