RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

        ( Weipeng Guo ),( Yonghong Chen ),( Yiqiao Cai ),( Tian Wang ),( Hui Tian ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.11

        Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimumblack hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.

      • A Novel Intrusion Detection Approach Based on Chaos Theory in Wireless Sensor Network

        Xinling Kong,Yonghong Chen,HuiTian,Tian Wang,Yiqiao Cai 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.11

        With the development of technology, wireless sensor networks(WSNs) has been widely used in military, political, medical and other fields, their characteristics of data-centric become increasingly prominent. In this paper, a data-oriented intruding detection method based on chaos theoy is proposed. We use the theory of chaotic system to analyze the internal rules of the sensory data and predict the data by RBF neural network firstly, then make an initial detection of false injected data attack according to whether the difference between the predicted and actual value is more than the threshold, finally confirming the attack by checking whether the number of abnormal within the cycle lies in the corresponding range. Experimental results show that RBF neural network predict sensory data more accurate, our approach can effectively distinguish the abnormal events caused by the attack or environmental factors and has high intrusion detection accuracy.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼