计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 144-147.doi: 10.11896/j.issn.1002-137X.2015.03.030

• 信息安全 • 上一篇    下一篇

面向移动传感网的攻击风险监测系统

倪 铭,张 宏,李千目   

  1. 南京理工大学计算机科学与工程学院 南京210094,南京理工大学计算机科学与工程学院 南京210094,南京理工大学计算机科学与工程学院 南京210094
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受江苏省自然科学重大研究项目:无线传感网的安全感知与全域安全控制(BK2011023),江苏省自然科学基金:无线传感网安全风险的全域感知、评估与控制(BK2011370),国家自然科学基金:信息系统的安全风险跟踪评价与动态预测(6090302)资助

Security Risk Monitor System of Mobile Sensor Network

NI Ming, ZHANG Hong and LI Qian-mu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 提出基于稳定性、安全性、簇大小选择和簇首节点合理选择的方法,从逻辑上对整个网络进行了簇的划分并选出最佳簇首节点,引入基于自回归模型的间隙性异常识别,实现了在簇首节点上执行自动检测网络流量异常和自动报警的功能。实验证明了该方法的有效性。

关键词: 攻击风险监测,簇移动传感网,自回归

Abstract: This paper proposed an approach based on stability,security,cluster size selection and rational cluster head node choice,which divides the entire network into clusters logically and selects the best head node.With a intermittent anomaly identification based on the auto-regressive(AR) model,it achieves automatic detection of network traffic anomalies on the head node of the cluster and automatic alarm.Experiments show the effectiveness of the proposed method.

Key words: Monitoring program on risk of attack,Cluster,Mobile sensor network,Auto-regressive

[1] Zhang Yong-guang,et al.Intrusion Detection in Wireless Ad hocNetworks[C]∥Proc.of the 6th Annual ACM/ IEEE International Conference on Mobile Computing and Networking.Boston:ACM Press,2000:275-283
[2] Kachirski O,Guha R.Effective Intrusion Detection Using Multiple Sensors in Wireless Sensor Networks [C]∥Proc.of the 36th Hawaii International Conference on System Science.Hawaii,2003:102-110
[3] Venkatraman L,Aagrawal D P.Strategies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks[J].Journal of Parallel and Distributed Computing,2003,63(2):214-227
[4] Gomez J,Campbell A T.PARO:Supporting dynamic power controlled routing in wireless Ad Hoc networks[J].ACM/Kluwer J.Wireless Networks,2003,9(5):443-460
[5] Toh C-K.Maximum battery life routing to support ubiquitous mobile computing in wireless Ad hoc networks[J].IEEE Communicating Magazine,2001(6):2-11
[6] Rodoplu V,Meng T.Minimum energy mobile wireless networks[J].IEEE Journal on Selected Areas in Communications, 1999,17(8):1333-1344
[7] Wattenhofer T.Distributed topology control for power efficient operation in multihop Ad Hoc networks[C]∥Proc.IEEE INFOCM Conf..2001:1388-1397
[8] Rappaport S.Wireless communications:principles and practice[M]∥Upper Saddle River.NJ:Prentice Hall,1995:72-75
[9] Bae S H,Lee S J,Su W,et al.The design,implementation andperformance evaluation of the on demand multicast routing protocols in multihop wireless networks[J].IEEE Network,2000,14(1):70-77
[10] Li Qian-mu.Multiple QoS Constraints Finding Paths Algorithm in TMN[J].Journal of Information,2011,4(3):223-231
[11] Li Qian-mu,Yin Jie.A Service Access Security Control Model in Cyberspace[C]∥Intelligent Computing and Information Science(ICICIS2011).2011,134:418-426
[12] 王芳,易平,等.基于规范的移动Ad hoc网络分布式入侵检测[J].计算机科学,2010,37(10):118-122

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!