期刊文献+
共找到199篇文章
< 1 2 10 >
每页显示 20 50 100
A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks 被引量:1
1
作者 G.Nagalalli GRavi 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期475-490,共16页
Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like d... Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like data sensing,data processing,and communication.In thefield of medical health care,these network plays a very vital role in transmitting highly sensitive data from different geographic regions and collecting this information by the respective network.But the fear of different attacks on health care data typically increases day by day.In a very short period,these attacks may cause adversarial effects to the WSN nodes.Furthermore,the existing Intrusion Detection System(IDS)suffers from the drawbacks of limited resources,low detection rate,and high computational overhead and also increases the false alarm rates in detecting the different attacks.Given the above-mentioned problems,this paper proposes the novel MegaBAT optimized Long Short Term Memory(MBOLT)-IDS for WSNs for the effective detection of different attacks.In the proposed framework,hyperpara-meters of deep Long Short-Term Memory(LSTM)were optimized by the meta-heuristic megabat algorithm to obtain a low computational overhead and high performance.The experimentations have been carried out using(Wireless Sensor NetworkDetection System)WSN-DS datasets and performance metrics such as accuracy,recall,precision,specificity,and F1-score are calculated and compared with the other existing intelligent IDS.The proposed framework provides outstanding results in detecting the black hole,gray hole,scheduling,flooding attacks and significantly reduces the time complexity,which makes this system suitable for resource-constraint WSNs. 展开更多
关键词 wireless sensor network intrusion detection systems long short term memory megabat optimization
在线阅读 下载PDF
Deep Learning and Entity Embedding-Based Intrusion Detection Model for Wireless Sensor Networks 被引量:3
2
作者 Bandar Almaslukh 《Computers, Materials & Continua》 SCIE EI 2021年第10期1343-1360,共18页
Wireless sensor networks(WSNs)are considered promising for applications such as military surveillance and healthcare.The security of these networks must be ensured in order to have reliable applications.Securing such ... Wireless sensor networks(WSNs)are considered promising for applications such as military surveillance and healthcare.The security of these networks must be ensured in order to have reliable applications.Securing such networks requires more attention,as they typically implement no dedicated security appliance.In addition,the sensors have limited computing resources and power and storage,which makes WSNs vulnerable to various attacks,especially denial of service(DoS).The main types of DoS attacks against WSNs are blackhole,grayhole,flooding,and scheduling.There are two primary techniques to build an intrusion detection system(IDS):signature-based and data-driven-based.This study uses the data-driven approach since the signature-based method fails to detect a zero-day attack.Several publications have proposed data-driven approaches to protect WSNs against such attacks.These approaches are based on either the traditional machine learning(ML)method or a deep learning model.The fundamental limitations of these methods include the use of raw features to build an intrusion detection model,which can result in low detection accuracy.This study implements entity embedding to transform the raw features to a more robust representation that can enable more precise detection and demonstrates how the proposed method can outperform state-of-the-art solutions in terms of recognition accuracy. 展开更多
关键词 wireless sensor networks intrusion detection deep learning entity embedding artificial neural networks
在线阅读 下载PDF
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable 被引量:2
3
作者 Hossein Jadidoleslamy 《Wireless Sensor Network》 2011年第7期241-261,共21页
Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their spe... Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions;but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose;but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure;i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea;then it analyzed and evaluated the acquired results from the questionnaires. 展开更多
关键词 wireless sensor Network (WSN) Security intrusion detection System (IDS) HIERARCHICAL Distributed SCALABLE DYNAMIC RECONFIGURABLE Attack detection.
在线阅读 下载PDF
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
4
作者 Hossein Jadidoleslamy 《International Journal of Communications, Network and System Sciences》 2011年第8期523-543,共21页
Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their spe... Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions;but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose;but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete architecture of Intrusion Detection System (IDS). The main contribution of this architecture is its modularity and flexibility;i.e. it is designed and applicable, in four steps on intrusion detection process, consistent to the application domain and its required security level. Focus of this paper is on the heterogeneous WSNs and network-based IDS, by designing and deploying the Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the base station (sink). Finally, this paper has been designed a questionnaire to verify its idea, by using the acquired results from analyzing the questionnaires. 展开更多
关键词 wireless sensor Network (WSN) Security intrusion detection System (IDS) Modular Attack Process detection Response Tracking
在线阅读 下载PDF
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology 被引量:3
5
作者 Emad Felemban 《International Journal of Communications, Network and System Sciences》 2013年第5期251-259,共9页
Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, sma... Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical applications such as military applications. This paper surveys the literature for experimenting work done in border surveillance and intrusion detection using the technology of WSN. The potential benefits of using WSN in border surveillance are huge;however, up to our knowledge very few attempts of solving many critical issues about this application could be found in the literature. 展开更多
关键词 wireless sensor Network intrusion detection BORDER SURVEILLANCE PERIMETER SURVEILLANCE REMOTE Monitoring
在线阅读 下载PDF
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
6
作者 R. Mohan Kumar A. V. Ram Prasad 《Circuits and Systems》 2016年第10期3228-3245,共19页
One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate ... One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities;the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN. 展开更多
关键词 wireless sensor networks Trust Management SECURITY intrusion detection System Malicious Attacks
在线阅读 下载PDF
Intrusion Detection in Ad-hoc Networks
7
作者 Haijun Xiao Fan Hong Hongwei Li 《通讯和计算机(中英文版)》 2006年第1期42-47,共6页
关键词 多约束QOS 入侵检测 AD HOC网络 路由
在线阅读 下载PDF
Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks 被引量:2
8
作者 Song Jianhua Ma Chuanxiang 《China Communications》 SCIE CSCD 2008年第2期34-39,共6页
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wirele... With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks. 展开更多
关键词 anomaly detection ROUTING ATTACKS DATA-MINING wireless sensor networks
在线阅读 下载PDF
A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection
9
作者 Chandraumakantham Om Kumar Sudhakaran Gajendran +2 位作者 Suguna Marappan Mohammed Zakariah Abdulaziz S.Almazyad 《Computers, Materials & Continua》 SCIE EI 2024年第10期471-501,共31页
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure... The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure the security of the network.Conventional intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system model.In this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot IoT.In this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant features.The proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO algorithm.This results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness estimation.As a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11. 展开更多
关键词 Deep learning intrusion detection fuzzy rules feature selection false alarm rate ACCURACY wireless sensor networks
在线阅读 下载PDF
An emerging technology-wearable wireless sensor networks with applications in human health condition monitoring 被引量:2
10
作者 Hairong Yan LiDa Xu +3 位作者 Zhuming Bi Zhibo Pang Jie Zhang Yong Chen 《Journal of Management Analytics》 EI 2015年第2期121-137,共17页
Monitoring health conditions over a human body to detect anomalies is a multidisciplinary task,which involves anatomy,artificial intelligence,and sensing and computing networks.A wearable wireless sensor network(WWSN)... Monitoring health conditions over a human body to detect anomalies is a multidisciplinary task,which involves anatomy,artificial intelligence,and sensing and computing networks.A wearable wireless sensor network(WWSN)turns into an emerging technology,which is capable of acquiring dynamic data related to a human body’s physiological conditions.The collected data can be applied to detect anomalies in a patient,so that he or she can receive an early alert about the adverse trend of the health condition,and doctors can take preventive actions accordingly.In this paper,a new WWSN for anomaly detections of health conditions has been proposed,system architecture and network has been discussed,the detecting model has been established and a set of algorithms have been developed to support the operation of the WWSN.The novelty of the detected model lies in its relevance to chronobiology.Anomalies of health conditions are contextual and assessed not only based on the time and spatial correlation of the collected data,but also based on mutual relations of the data streams from different sources of sensors.A new algorithm is proposed to identify anomalies using the following procedure:(1)collected raw data is preprocessed and transferred into a set of directed graphs to represent the correlations of data streams from different sensors;(2)the directed graphs are further analyzed to identify dissimilarities and frequency patterns;(3)health conditions are quantified by a coefficient number,which depends on the identified dissimilarities and patterns.The effectiveness and reliability of the proposed WWSN has been validated by experiments in detecting health anomalies including tachycardia,arrhythmia and myocardial infarction. 展开更多
关键词 E-HEALTHCARE Internet of Things wearable wireless sensor network(WWSN) anomaly detection condition monitoring data acquisition and processing
原文传递
Improved Data Discrimination in Wireless Sensor Networks 被引量:1
11
作者 B. A. Sabarish S. Shanmugapriya 《Wireless Sensor Network》 2012年第4期117-119,共3页
In Wireless Sensors Networks, the computational power and storage capacity is limited. Wireless Sensor Networks are operated in low power batteries, mostly not rechargeable. The amount of data processed is incremental... In Wireless Sensors Networks, the computational power and storage capacity is limited. Wireless Sensor Networks are operated in low power batteries, mostly not rechargeable. The amount of data processed is incremental in nature, due to deployment of various applications in Wireless Sensor Networks, thereby leading to high power consumption in the network. For effectively processing the data and reducing the power consumption the discrimination of noisy, redundant and outlier data has to be performed. In this paper we focus on data discrimination done at node and cluster level employing Data Mining Techniques. We propose an algorithm to collect data values both at node and cluster level and finding the principal component using PCA techniques and removing outliers resulting in error free data. Finally a comparison is made with the Statistical and Bucket-width outlier detection algorithm where the efficiency is improved to an extent. 展开更多
关键词 wireless sensor networks (WSN) Data MINING CLUSTERING anomaly detection OUTLIER detection
在线阅读 下载PDF
An Isolation Principle Based Distributed Anomaly Detection Method in Wireless Sensor Networks 被引量:3
12
作者 Zhi-Guo Ding Da-Jun Du Min-Rui Fei 《International Journal of Automation and computing》 EI CSCD 2015年第4期402-412,共11页
Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collect... Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collected from WSNs effectively.This is achieved by proposing a distributed anomaly detection algorithm based on ensemble isolation principle.The new method offers distinctive advantages over the existing methods.Firstly,it does not require any distance or density measurement,which reduces computational burdens significantly.Secondly,considering the spatial correlation characteristic of node deployment in WSNs,local sub-detector is built in each sensor node,which is broadcasted simultaneously to neighbor sensor nodes.A global detector model is then constructed by using the local detector model and the neighbor detector model,which possesses a distributed nature and decreases communication burden.The experiment results on the labeled dataset confirm the effectiveness of the proposed method. 展开更多
关键词 Distributed anomaly detection isolation principle light-weight method ensemble learning wireless sensor networks(WSNs)
原文传递
Behavior analysis of malicious sensor nodes based on optimal response dynamics 被引量:1
13
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
在线阅读 下载PDF
无线传感网络中一种基于RF-GAN模型的入侵检测算法 被引量:1
14
作者 黄俊萍 《长沙大学学报》 2024年第2期23-28,共6页
针对现有无线传感网络入侵检测算法存在的效率低、精度差等问题,提出基于RFGAN模型的无线传感网络入侵检测算法。首先,采集无线传感网络运行数据,通过去噪、缺失补偿等步骤,完成对原始数据的预处理;然后,利用RF-GAN模型提取无线传感网... 针对现有无线传感网络入侵检测算法存在的效率低、精度差等问题,提出基于RFGAN模型的无线传感网络入侵检测算法。首先,采集无线传感网络运行数据,通过去噪、缺失补偿等步骤,完成对原始数据的预处理;然后,利用RF-GAN模型提取无线传感网络运行特征;最后,通过提取特征与检测标准的匹配,得出网络入侵检测结果。理论分析及实验结果表明:优化设计方法的入侵类型误检率明显更低,入侵数据量检测误差为0.015GB,相较于现有检测算法具有一定优势。 展开更多
关键词 RF-GAN模型 无线传感网络 网络入侵检测 特征提取
在线阅读 下载PDF
Effective data transmission through energy-efficient clustering and Fuzzy-Based IDS routing approach in WSNs
15
作者 Saziya TABBASSUM Rajesh Kumar PATHAK 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期1-16,共16页
Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,a... Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner. 展开更多
关键词 Low energy adaptive clustering hierarchy(LEACH) intrusion detection system(IDS) wireless sensor network(WSN) Fuzzy logic and artificial neural network(ANN)
在线阅读 下载PDF
机器学习在WSN入侵检测中的应用研究 被引量:1
16
作者 姜来为 顾海洋 +1 位作者 谢丽霞 杨宏宇 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2024年第4期206-225,共20页
随着计算机、通信技术的不断发展,网络经常面临各种各样的攻击。无线传感器网络(Wireless Sensor Network,WSN)的分布式和无线传输等特性使其易于遭受网络攻击,为WSN安全防护方案设计带来了严峻考验。入侵检测是一种积极主动的安全防护... 随着计算机、通信技术的不断发展,网络经常面临各种各样的攻击。无线传感器网络(Wireless Sensor Network,WSN)的分布式和无线传输等特性使其易于遭受网络攻击,为WSN安全防护方案设计带来了严峻考验。入侵检测是一种积极主动的安全防护技术,是网络攻击检测的重要手段,是保障WSN网络环境安全的关键技术。近年来,机器学习方法在许多领域都取得了巨大的发展,在WSN入侵检测领域取得了一定的应用研究成果。为了便于对WSN入侵检测技术进行深入研究,从WSN的特点和WSN入侵检测研究的独特性出发,对近些年该领域的相关研究进行分类综述。首先,简要介绍了WSN所面临的挑战和发展现状。然后,根据WSN的特点分析了入侵检测在WSN中设计时面临的挑战。随后对WSN入侵检测相关研究进行文献综述与分类,重点对基于机器学习的应用研究方法进行分类论述与探讨。最后,讨论该研究方向未来发展前景与方向,为推动WSN入侵检测领域深入研究与实际应用提供参考。 展开更多
关键词 无线传感器网络 安全防护 入侵检测 机器学习
在线阅读 下载PDF
基于反向传播算法的网络安全态势感知仿真 被引量:2
17
作者 张婷婷 王智强 《计算机仿真》 2024年第3期436-440,共5页
随着互联网技术的广泛应用,网络信息传输的数量日益提升,网络安全态势感知的需求也逐渐增加。针对当前网络安全态势感知算法检测准确率率低,误差较大等问题,提出了基于反向传播算法的网络安全态势感知模型。首先采用大数据分析方法对入... 随着互联网技术的广泛应用,网络信息传输的数量日益提升,网络安全态势感知的需求也逐渐增加。针对当前网络安全态势感知算法检测准确率率低,误差较大等问题,提出了基于反向传播算法的网络安全态势感知模型。首先采用大数据分析方法对入侵信息的特征按节点分解并进行分段分析;其次通过切换检测信道和空间节点的分布式融合方法对关键节点进行分析,提取入侵数据的特征;然后通过反向传播算法对基本的感知原理进行优化,以减小模型检测过程中的误差;最后基于信息融合的结果进行优化,通过模糊识别的方法对入侵行为进行检测,达到安全态势感知的效果。实验结果表明,相比其它算法,所提模型将平均绝对误差缩小近5%,预测精确度提升至少7%,有最佳的实验效果,推动了网络安全态势感知技术的发展和应用。 展开更多
关键词 网络安全态势感知 反向传播算法 入侵检测 无线传感节点
在线阅读 下载PDF
基于微分博弈的异质无线传感器网络恶意程序传播研究与分析
18
作者 汤梦晨 吴国文 +2 位作者 张红 沈士根 曹奇英 《计算机应用与软件》 北大核心 2024年第7期100-105,共6页
为抑制异质无线传感器网络(Heterogeneous Wireless Sensor Networks,HWSNs)恶意程序的传播,考虑节点能量和计算能力差异,提出一种HWSNs攻防博弈模型。通过计算得到攻防双方的混合纳什均衡,再结合微分博弈建立攻防双方节点转换微分方程... 为抑制异质无线传感器网络(Heterogeneous Wireless Sensor Networks,HWSNs)恶意程序的传播,考虑节点能量和计算能力差异,提出一种HWSNs攻防博弈模型。通过计算得到攻防双方的混合纳什均衡,再结合微分博弈建立攻防双方节点转换微分方程,分析得到恶意节点比例动态演化规律。结合数值实验分析,验证有效抑制HWSNs恶意程序传播的方式。 展开更多
关键词 异质无线传感器网络 微分博弈 恶意程序 入侵检测
在线阅读 下载PDF
基于复杂网络演化博弈的无线传感器网络入侵检测方法
19
作者 王心怡 行鸿彦 +2 位作者 史怡 侯天浩 郑锦程 《电子测量与仪器学报》 CSCD 北大核心 2024年第9期85-94,共10页
针对无线传感器网络资源受限和入侵检测系统策略优化问题,本文提出一种基于复杂网络演化博弈的无线传感器网络入侵检测方法。结合小世界模型理论,模拟网络节点之间的连接关系,在不改变节点原有关系的前提下增强网络连通性并降低传输能耗... 针对无线传感器网络资源受限和入侵检测系统策略优化问题,本文提出一种基于复杂网络演化博弈的无线传感器网络入侵检测方法。结合小世界模型理论,模拟网络节点之间的连接关系,在不改变节点原有关系的前提下增强网络连通性并降低传输能耗;构建关于簇头节点和恶意节点的无线传感器网络攻防博弈模型,通过收益矩阵计算节点收益,利用奖惩机制描述节点在博弈过程中选择不同策略的收益变化;引入经验加权吸引力学习算法改进传统博弈的策略更新规则并将该算法应用于入侵检测系统,使得簇头节点能够动态更新策略选择,得到不同条件下的入侵检测最优策略。实验结果表明,与传统方法相比,所提算法的簇头节点检测策略扩散深度可以达到79%,该算法下簇头节点在保障自身检测收益的同时尽可能选择检测传感器网络中出现的攻击,保证网络检测率并减少网络各类资源的消耗。 展开更多
关键词 无线传感器网络 入侵检测 演化博弈 复杂网络 小世界模型理论
在线阅读 下载PDF
对抗防御的IWSN入侵检测强化模型
20
作者 刘悦文 孙子文 《小型微型计算机系统》 CSCD 北大核心 2024年第8期1980-1986,共7页
针对工业无线传感器网络中基于深度学习的入侵检测易受到对抗样本影响的问题,基于生成对抗网络构建对抗防御的IWSN入侵检测强化模型.首先,受生成对抗网络原理的启发,将分类器与对抗学习结合,通过提高样本训练次数及生成样本攻击性以加... 针对工业无线传感器网络中基于深度学习的入侵检测易受到对抗样本影响的问题,基于生成对抗网络构建对抗防御的IWSN入侵检测强化模型.首先,受生成对抗网络原理的启发,将分类器与对抗学习结合,通过提高样本训练次数及生成样本攻击性以加大模型训练强度,达到提升模型检测性能的目的.其次,采用多层感知器构建模型的网络结构,以适应IWSN中特征独立的高维数据.同时,引入约束条件、对抗损失与Wasserstein距离改进模型的损失函数,以保证对抗训练的稳定性.在WSN_DS数据集与天然气管道数据集上进行了对比、类比与效率实验,结果表明,模型对各对抗样本的防御效果较现有方法有所提升,且具有较强的入侵攻击检测性能. 展开更多
关键词 工业无线传感器网络 深度学习 生成对抗网络 对抗样本 入侵检测
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部