...
首页> 外文期刊>IEEE Transactions on Intelligent Transportation Systems >A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles
【24h】

A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles

机译:基于概率数据结构的软件定义车辆互联网的异常检测方案

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Internet of Vehicles (IoV) has escalated the movement of big data across moving vehicles which create a huge burden on the network infrastructure. In IoV environment, effective handling of streaming data has to face various challenges like; traffic monitoring, flow management, re-configuration and security. Software-defined networks (SDN) provides improved flexibility, and centralized control of the network to overcome (almost) the above-mentioned challenges. However, it can lead to an easy target (node or controller) for malicious agents. So, to detect the anomalous behaviour of the nodes in the IoV environment, a hybrid approach using probabilistic data structures is proposed which works in the following phases. In phase I, a traffic monitoring scheme using Count-Min-Sketch is designed to identify the suspicious nodes. In phase II, to detect an anomaly, a Bloom filter-based control scheme is used for signature verification of suspicious nodes. In phase III, a Quotient filter is used for fast and efficient storage of malicious nodes. In phase IV, to detect the super points (malicious hosts that are connected to a large number of destinations), a Hyperloglog counter is used to measure the cardinality of each flow passing through the switches. The proposed scheme has been evaluated in a simulated environment. The results obtained depict that the proposed scheme is faster, accurate, and efficient concerning detection ratio and false-positive ratio.
机译:车辆互联网(IOV)升级了跨移动车辆的大数据的运动,这些车辆在网络基础设施上产生了巨大的负担。在IOV环境中,有效处理流数据必须面临各种挑战;流量监控,流量管理,重新配置和安全性。软件定义的网络(SDN)提供了改进的灵活性,以及​​网络的集中控制,以克服(几乎)上述挑战。但是,它可以导致恶意代理的易于目标(节点或控制器)。因此,为了检测IOV环境中节点的异常行为,提出了一种使用概率数据结构的混合方法,其在以下阶段工作。在I阶段I中,使用Count-Min-Shixt的流量监控方案旨在识别可疑节点。在II期中,为了检测异常,用于盛开的基于滤波器的控制方案用于可疑节点的签名验证。在第III阶段,商滤波器用于快速有效地存储恶意节点。在IV阶段,要检测超级点(连接到大量目的地的恶意主机),Hyperoglog计数器用于测量通过交换机的每个流的基数。所提出的方案已经在模拟环境中进行了评估。得到的结果描绘了所提出的方案更快,准确,有效地有关检测比和假阳性比率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号