期刊文献+

无线电网络中数据伪造攻击检测方法研究 被引量:1

Data Forgery Attack Detection Method in Wireless Network
下载PDF
导出
摘要 针对传统的检测方法一直存在检测误差率大,能耗多的问题,提出基于主成分分析方法与平均评分偏离度计算法结合的无线电网络中数据伪造攻击检测方法.采用函数极值法,确定隶属度,获取无线电网络数据伪造攻击特征.采用统计学分析法,确定无线电网络数据伪造攻击分类函数,建立无线电网络中数据伪造攻击模型,采用主成分分析方法对初始无线电网络数据伪造攻击的协方差矩阵进行特征值分解,引入平均评分偏离度计算法,确定无线电网络数据伪造攻击偏离度,实现无线电网络中数据伪造攻击的检测.实验结果表明,采用改进检测方法时,其检测能耗及误检率方面在一定程度上,相比传统的检测方法要好,具有一定的优势. Based on the traditional detection methods have high detection error rate, energy consumption problems, puts forward the data radio network principal component analysis method and the average score combined with deviation calculation method of forgery attack detection method based on. Using function extreme value method to determine the degree of membership, to obtain the characteristics of radio network data forgery attack. Using the discrete wavelet transform method to pre process the data in the radio network. Using statistical analysis method, the determination of the radio network data forgery attack classification function, data forgery attack models for radio network, ushng principal oorr;nent analysis method to the covariance matrix of the forgery attack on the initial radio network data eigenvalue decomposition, the average score calculation method is introduced to determine the deviation from the radio network data forgery attack deviation, realize the detection data forgery the radio network attack. Experimental results show that the improved detection method, the detection of energy consumption and false detection rate to a certain extent, compared with the traditional detection method is better, has a certain advantage.
作者 马小雨
出处 《微电子学与计算机》 CSCD 北大核心 2017年第2期105-108,共4页 Microelectronics & Computer
关键词 无线电网络 数据 伪造攻击 检测 radio network data forgery attack detection
  • 相关文献

参考文献7

二级参考文献91

  • 1周东清,张海锋,张绍武,胡祥培.基于HMM的分布式拒绝服务攻击检测方法[J].计算机研究与发展,2005,42(9):1594-1599. 被引量:15
  • 2朱·弗登博格,让·梯若尔.博弈论[M].北京:中国人民大学出版社,2010:401-403. 被引量:12
  • 3CHRISTEY S, MARTIN R A. Vulnerability type distribu- tions in CVE [ EB/OL ]. [ 2011-08-20 ]. http ://cwe. mitre. org/documents/vuln-trends.html. 被引量:1
  • 4FIELDING R, GETYYS J, MOGUL J, et al. RFC-2616: hypertext transfer protocol-HTrP/1.1 [ S ]. Montreal : Inter- net Engineering Task Force (IETF), 1999. 被引量:1
  • 5NGHAM K L, SOMAYAJIB A, BURGEA ], et al. Learn- ing DFA representations of HTTP for protecting web applica-tions E J ]. Computer Networks, 2007, 5 l (5) : 1239-1255. 被引量:1
  • 6CORONA I, ARIU D, GIACINTO G. HMM-Web: a frame- work for the detection of attacks against web applications [ C ]//IEEE International Conference on Communications. Dresden, Germany, 2009: 1-6. 被引量:1
  • 7DURY A, HALLAL H H, PETRENKO A. Inferring behav- ioural models from traces of business applications [ C ]// IEEE International Conference on Web Services. Los Angel- es, USA, 2009: 791-798. 被引量:1
  • 8BACE R. Intrusion detection[ M]. [ S.1.] : Macmillan Pub- lishing Co. Inc., 2000: 1-4. 被引量:1
  • 9ROESCH M. Snort-lightweight intrusion detection for net- works [ C]//Proceedings of the 13th USENIX Conference on System Administration. Seattle, USA, 1999: 229-238. 被引量:1
  • 10CHANDOLA V, BANERJEE A, KUMAR V. Anomaly de- tection: a survey [ J ]. ACM Computing Surveys, 2009, 41 (3) : artical no. 15. 被引量:1

共引文献13

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部