期刊文献+

船舶通信网络入侵节点分类方法研究

Research on classification method of intrusion nodes in ship communication network
下载PDF
导出
摘要 对船舶通信网络入侵节点进行分类是保护船舶信息安全主要途径之一,但是随着入侵节点数目的增加,基于密度自适应粒子群算法的通信网络入侵节点分类方法分类误差较大,无法实现对入侵节点准确判别和分类。针对上述问题,提出基于信任值的通信网络入侵节点分类方法。首先计算节点的直接信任值,然后在此基础上计算节点的间接信任值,最后将直接信任值与间接信任值相结合,计算节点的综合信任值,同时利用异常行为检测算法对节点行为进行检测,判断节点类型,实现入侵节点的分类。结果表明:基于信任值的通信网络入侵节点分类方法与基于密度自适应粒子群算法的通信网络入侵节点分类方法相比,前者较后者分类误差降低了7%,分类准确性有了很大的提高。 The classification of intrusion nodes in ship communication network is one of the main ways to protect the information security of ships. However, with the increase of the number of intrusion nodes, the classification error of the intrusion node classification method based on the density adaptive particle swarm optimization algorithm is large, and the accurate discrimination and classification of the intrusion nodes can not be realized. In view of the above problems, a classification method based on trust value for communication network intrusion nodes is proposed. First, the direct trust value of the node is calculated, and then the indirect trust value of the node is calculated. Finally, the direct trust value and the indirect trust value are combined to calculate the comprehensive trust value of the node. At the same time, the anomaly behavior detection algorithm is used to detect the node behavior, judge the type of nodes, and achieve the classification of intrusion nodes. The results show that the classification method of the communication network intrusion nodes based on the trust value is compared with the method based on the density adaptive particle swarm optimization(PSO) based on the network intrusion node classification method, the former is 7% lower than the latter, and the classification accuracy has been greatly improved.
作者 张博
出处 《舰船科学技术》 北大核心 2018年第10X期163-165,共3页 Ship Science and Technology
关键词 通讯网络 节点分类 信任值 行为异常检测 communication network node classification trust value behavior anomaly detection
  • 相关文献

参考文献5

二级参考文献59

  • 1危胜军,胡昌振,高秀峰.基于学习Petri网的网络入侵检测方法[J].兵工学报,2006,27(2):269-272. 被引量:5
  • 2Elngar A A,El AMD A,Ghaleb F F M.A Real -TimeAnomaly Network Intrusion Detection System with High Ac-curacy[J]. Information Sciences Letters, 2013,35⑶:49-56.
  • 3Subaira. A S, Anitha. P. A Survey: Network Intrusion Detec-tion System based on Data Mining Techniques [J]. Interna-tional Journal of Computer Science & Mobile Computing,2013,2(10):174-185.
  • 4Hsieh C F, Cheng K F, Huang Y F, et al. An Intrusion De-tection System for Ad Hoc Networks with Multi -attacksBased on a Support Vector Machine and Rough Set Theory[J], Journal of Convergence Information Technology, 2013,26(5):269-281.
  • 5Mehta S B,Chaudhury S, Bhattacharyya A, et al. Tissueclassification in magnetic resonance images through the hy-brid approach of Michigan and Pittsburg genetic algorithm.[J]. Applied Soft Computing, 2011,11(4):3476 - 3484.
  • 6LiW, Gong Z, Michigan-based variable -length encoding ofgenetic algorithm for k-anonymization[Cy/ Information Scienceand Engineering (ICISE), 2010 2nd International Conferenceon. 2010:1295-1298.
  • 7DaiF,Zheng K, Binwu, et al. Using Genetic Algorithm forOptimal Security Hardening in Risk Flow Attack Graph [J].Ksii Transactions on Internet & Information Systems, 2015, 9(4):3476 - 3484.
  • 8Babbar-SebensM,Minsker B S. Interactive Genetic Algo-(上接第111页)rithm with Mixed Initiative Interaction for multi -criteriaground water monitoring design [J]. Applied Soft Computing,2012,12(1):182-195.
  • 9WanwarangT, Ongtang M. Elitism Enhancements for Ge-netic Algorithm based Network Intrusion Detection System[J].Journal of Convergence Information Technology, 2013,38(5):137-140.
  • 10尹才荣,叶震,单国华,赵晓峰.基于混合入侵检测技术的网络入侵检测方法[J].合肥工业大学学报(自然科学版),2009,32(1):69-72. 被引量:9

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部