首页> 外文会议>International Conference on P2P, Parallel, Grid, Cloud and Internet Computing >Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
【24h】

Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks

机译:将数据挖掘技术应用于无线传感器网络中的入侵检测

获取原文

摘要

Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They have many potential applications for both civil and military tasks. However, the unattended nature of WSNs and the limited computational and energy resources of their nodes make them susceptible to many types of attacks. Intrusion detection is one of the major and efficient defence methods against attacks in a network infrastructure. Intrusion Detection Systems can be seen as the second line of defence and they complement the security primitives that are adopted in order to prevent attacks against the computer network being protected. The peculiar features of a wireless sensor network pose stringent requirements to the design of intrusion detection systems. In this paper, we propose a hybrid, lightweight, distributed Intrusion Detection System (IDS) for wireless sensor networks. This IDS uses both misuse-based and anomaly-based detection techniques. It is composed of a Central Agent, which performs highly accurate intrusion detection by using data mining techniques, and a number of Local Agents running lighter anomaly-based detection techniques on the motes. Decision trees have been adopted as classification algorithm in the detection process of the Central Agent and their behaviour has been analysed in selected attacks scenarios. The accuracy of the proposed IDS has been measured and validated through an extensive experimental campaign. This paper presents the results of these experimental tests.
机译:近年来,无线传感器网络(WSN)成为研究的热点。它们在民用和军事任务中都有许多潜在的应用。但是,WSN的无人值守性质以及其节点的有限计算和能源资源使它们容易受到多种类型的攻击。入侵检测是针对网络基础架构中攻击的主要有效防御方法之一。入侵检测系统可以看作是第二道防线,它们可以补充采用的安全原语,以防止针对受保护的计算机网络的攻击。无线传感器网络的独特功能对入侵检测系统的设计提出了严格的要求。在本文中,我们提出了一种用于无线传感器网络的混合,轻量级,分布式入侵检测系统(IDS)。该IDS使用基于滥用和基于异常的检测技术。它由中央代理(通过使用数据挖掘技术执行高精度的入侵检测)和许多本地代理(在代理上运行基于较轻的基于异常的检测技术)组成。在中央代理的检测过程中,决策树已被用作分类算法,并且已在选定的攻击场景中分析了决策树的行为。提议的IDS的准确性已通过广泛的实验活动进行了测量和验证。本文介绍了这些实验测试的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号