期刊文献+

基于SART的入侵检测仿真研究 被引量:2

Simulation and Research on Intrusion Detection Based on SART
下载PDF
导出
摘要 研究点对点网络入侵检测优化问题。点对点网络是一种多跳的、无中心的、自组织无线网络,其主机经常根据需要移动,主机的移动会使网络拓扑结构不断发生变化,而且变化的方式和速度都是不可预测的,这给网络入侵检测带来了困难。传统的检测方法针对网络拓扑结构稳定的网络效果很好,对于自组织的不可预测的点对点网络人侵检测准确性不高。为了提高检测能力和准确度,提出了改进ART2的入侵检测方法(SART)。当人工神经网络中所存储的模式量较大时,可对学习所得模式进行有效组织进而提高检测效率,通过调节幅度与相位的判断条件线性组合来缩小聚类之间的大小差异。仿真结果表明,相比其它检测算法,改进后的算法聚类的检测率较高,误检率较低,可满足误用检测及异常检测的需求。 The optimization of point to point network intrusion detection was researched. For improving the detec- tion ability and accuracy, an improved intrusion detection method of ART2 was proposed based on SART. When the pattern storage of artificial neural network was large, the mode after leaning were organized effectively, and the detec- tion efficiency was improved. The judging condition linear combination of amplitude and phase was adjusted for de- creasing the difference between the clusters. Simulation result shows that the improved algorithm has higher clustering detection performance than the traditional algorithm, and the false detection rate is low. It can meet the demands of misuse detection and anomaly detection.
作者 张鹏
出处 《计算机仿真》 CSCD 北大核心 2014年第1期311-314,共4页 Computer Simulation
关键词 点对点网络 入侵检测 自适应谐振算法 人工神经网络 Point to point network Intrusion detection ART2 algorithm Artificial neural network
  • 相关文献

参考文献9

  • 1L Abusalah, A Khokhar, M Guizani. A survey of secure mobile AdHoc routing protocols [ J ]. IEEE Communications Surveys & Tuto-rials, 2008,10(4) :78-93. 被引量:1
  • 2P Brutch, C Ko. Challenges in Intrusion Detection for Wireless Ad-hoc Networks[ J]. In: 2003 Symposium on Applications and theinternet Workshops (SAINT*03 Workshops),2003. 被引量:1
  • 3于尧,李喆,刘军.移动自组网中一种基于信誉的安全分簇算法[J].东北大学学报(自然科学版),2009,30(9):1257-1261. 被引量:6
  • 4V Varadharajan, R Shankaran, M Hitchens. Security for clusterbased Ad Hoc networks[ J]. Computer Communication,2004,27(5) : 488-501. 被引量:1
  • 5ZhangYongguang, Lee Wenke. Intrusion Detection in Wireless Ad-Hoc Networks [ C ]. Proceedings of the 6 thAnnual InternationalConference on Mobile Computing and Networking. Boston : Massa-chussetts, 2000 : 6-11. 被引量:1
  • 6Q J Gu, P Liu, C H Chu. Analysis of area - congestion - basedDDoS attacks in Ad Hoc networks[ J]. Ad Hoc Networks,2007,5(5) :613-625. 被引量:1
  • 7张晓宁,冯登国.基于模糊行为分析的移动自组网入侵检测[J].计算机研究与发展,2006,43(4):621-626. 被引量:3
  • 8H Deng, Q A Zeng, D P Agrawal. SVM-based Intrusion DetectionSystem for Wireless Ad Hoc Networks[ C]. In:Proceedings of theIEEE Vehicular Technology Conference (VTC103),2003. 被引量:1
  • 9G Vigna, et al. An Intrusion Detection Tool for AODV-based Adhoc Wireless Networks[ C]. In: Proceedings of the Annual Com-puter Security Applications Conference ( ACSAC) Tucson, AZ De-cember 2004 . 被引量:1

二级参考文献20

  • 1Rachedi A, Benslimane A. Trust and mobility-based clustering algorithm for secure mobile Ad Hoc networks [ C ] // ICSNC. Tahiti: IEEE, 2006 : 72 - 77. 被引量:1
  • 2Er I I, Seah W K G. Mobility-based d-hop clustering algorithm for mobile Ad Hoc networks [ C ] // WCNC. Atlanta: IEEE, 2004:2359 - 2364. 被引量:1
  • 3Sheu P R, Wang C W. A stable clustering algorithm based on battery power for mobile AA Hoc networks [ J ]. Tam]eang Journal of Science and Engineering, 2006,9(3) :233 - 242. 被引量:1
  • 4Konstantopoulos C, Gavalas D, Pantziou G. Clustering in mobile Ad Hoc networks through neighborhood stability-based mobility prediction [ J ]. Computer Networks, 2008, 52 (9) : 1797 - 1824. 被引量:1
  • 5Er I I, Seah W K G. Clustering overhead and convergence time analysis of the mobility-based multi-hop clustering algorithm for mobile Ad Hoc networks [ J ]. Journal of Computer and System Sciences, 2006,72(7) : 1144 - 1155. 被引量:1
  • 6Yan L S, Wei Y, Zhu H, et al. Information theoretic framework of trust modeling and evaluation for Ad Hoc networks [ J ]. IEEE Journal on Selected Areas in Communications, 2006,24(2) :305 - 317. 被引量:1
  • 7Royer E M, MeUiar-Smith P M, Moser L E. An analysis of the optimum node density for Ad Hoc mobile networks[ C]// ICC. Helsinki: IEEE, 2001:857 - 861. 被引量:1
  • 8Xu K X, Hong X Y, Gerla M. An Ad Hoe network with mobile backbones[C]//ICC. New York: IEEE, 2002:3138 - 3145. 被引量:1
  • 9Chatterjee M, Sas S K, Turgut D. An On-demand weighted clustering algorithm (WCA) for Ad Hoe networks [ C ]// GLOBECOM. San Francisco: IEEE, 2000:1697-1701. 被引量:1
  • 10Yih-Chun Hu,Adrian Perrig,David B.Johnson.A defense against wormhole attacks in wireless ad hoc networks.IEEE INFOCOM 2003,San Francisco,CA,2003 被引量:1

共引文献6

同被引文献22

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部