期刊文献+

基于信誉评估的Ad hoc分布式入侵检测 被引量:3

Distributed Intrusion Detection of Ad hoc Network Based on Reputation
下载PDF
导出
摘要 为提高节点资源受限条件下的Ad hoc网络入侵检测率,提出了基于信誉评估的分布式入侵检测模型,模型分为信誉评估、贝叶斯博弈检测和综合检测三部分。采用邻居节点共享信誉的方式,综合计算本地直接信誉与邻居节点的间接信誉,提高信誉评估准确性。根据信誉评估值选择检测方式,贝叶斯博弈检测动态调整检测策略可节省资源,综合检测可提高入侵检测率和降低误检率。通过实验与数据分析,本模型具有较高检测率和较低的资源消耗。 In order to improve the intrusion detection rate under the condition of limited resources of Ad hoc network nodes,a distributed intrusion detection model based on reputation is proposed in this paper.The model is divided into three parts,reputation evaluation,Bayesian game detection and compound detection.The direct reputation of the local node and the indirect reputation of the neighbor nodes are calculated comprehensively,thus improving the accuracy of the reputation evaluation.Then,the detection method is selected based on the reputation value of the detected node.When the reputation of the detected node is high,Bayesian game detection is choosen to reduce the consumption of node resources.On the contrary,when the node reputation decreases and exceeds the set threshold,compound detection to is selected improve detection rate.Through data analysis,this model has high detection rate and low resource consumption.
作者 陈赵懿 高秀峰 王帅 韩月明 CHEN Zhao-yi;GAO Xiu-feng;WANG Shuai;HAN Yue-ming(Equipment Simulation Training Center,Shijiazhuang Campus of Army Engineering University,Shijiazhuang 050003,China)
出处 《火力与指挥控制》 CSCD 北大核心 2020年第9期6-11,共6页 Fire Control & Command Control
基金 国家自然科学基金(61271152) 军内科研基金资助项目(130105197302074514)。
关键词 AD HOC 信誉 贝叶斯博弈 入侵检测 交叉验证 Ad hoc reputation bayesian game intrusion detection detection rate cross-validation
  • 相关文献

参考文献1

二级参考文献35

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献62

同被引文献27

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部