首页 | 本学科首页   官方微博 | 高级检索  
     

一种蚁群优化的WSN分布式入侵检测模型
引用本文:余小华,黄灿辉,陈瑛.一种蚁群优化的WSN分布式入侵检测模型[J].计算机工程与应用,2012,48(9):78-82,85.
作者姓名:余小华  黄灿辉  陈瑛
作者单位:1. 华南理工大学广州学院计算机工程系,广州,510800
2. 华南师范大学增城学院计算机系,广州,511363
基金项目:广东省科技计划项目(No.2007b010400068);省部产学研结合项目(No.20118090400085).
摘    要:针对无线传感器网络中入侵者能在多个节点上移动并隐藏攻击源头的特点,提出了一种基于蚁群优化的无线传感器网络分布式入侵检测模型。分析了现有入侵检测对未知攻击检测率和误报率方面的不足,在此基础上提出了分布式入侵检测的体系结构,设计了基于蚁群优化的入侵检测算法。仿真实验表明提出的方案能够提高无线传感器网络对未知攻击的检测率和降低对正常网络流量的误报率,较好地解决了路由攻击、Sinkhole攻击问题,能够降低入侵检测的能耗。

关 键 词:无线传感器网络  分布式入侵检测  蚁群优化  路由攻击  Sinkhole攻击

Distributed intrusion detection model based on ant colony optimization for wireless sensor networks
YU Xiaohua , HUANG Canhui , CHEN Ying.Distributed intrusion detection model based on ant colony optimization for wireless sensor networks[J].Computer Engineering and Applications,2012,48(9):78-82,85.
Authors:YU Xiaohua  HUANG Canhui  CHEN Ying
Affiliation:1.Department of Computer Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, China 2.Department of Computer, Zengcheng College of South China Normal University, Guangzhou 511363, China
Abstract:Considering wireless sensor network for intruders to move on multiple nodes and hide the source of the attacks, a distributed intrusion detection model based on ant colony optimization is proposed for wireless sensor networks. The drawback of the existing in- trusion detection for unknown attack detection rate and false-positive rate is analyzed. A distributed intrusion detection architecture is put forward and designed based on ant colony optimization algorithm for intrusion detection. Simulation results show that the proposed scheme can improve the intrusion detection accuracy rate of the unknown attack, and reduce the false-positive rate of normal network traffic, solve the problem of routing attacks and Sinkhole attacks, as well as reduce energy consumption for intrusion detection in wire- less sensor networks.
Keywords:Wireless Sensor Networks  distributed intrusion detection  ant colony optimization  routing attack  Sinkhole attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号