A Novel Method Based on Clustering Algorithm and SVM for Anomaly Intrusion Detection of Wireless Sensor Networks

Article Preview

Abstract:

Based on the principle that the same class is adjacent, an anomaly intrusion detection method based on K-means and Support Vector Machine (SVM) is presented. In order to overcome the disadvantage that k-means algorithm requires initializing parameters, this paper proposes an improved K-means algorithm with a strategy of adjustable parameters. According to the location of wireless sensor networks (WSN), we can obtain clustering results by applying improved K-means algorithm to WSN, and then SVM algorithm is applied to different clusters for anomaly intrusion detection. Simulation results show that the proposed method can detect abnormal behaviors efficiently and has high detection rate and low false positive rate than the current typical intrusion detection schemes of WSN.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3745-3749

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Jianzhong Li and Hong Gao: Journal of Computer Research and Development. Vol. 45(2008), p.1~15, in Chinese.

Google Scholar

[2] C. Karlof and D. Wagner D: Ad Hoc Networks. Vol. 1(2003), pp.293-315.

Google Scholar

[3] Y. Zhang and W. Lee. In Proc. ACM MobiCom, 2000, pp.275-283.

Google Scholar

[4] Xiaomei Cao, ZhiJie Han and GuiHai Chen. Chinese Journal of Computer. Vol. 30(2007), pp.1798-1805, in Chinese.

Google Scholar

[5] Pei Wang, Xianwei Zhou, Boping Qin et. al: Chinese Journal of Sensors and Actuators. Vol. 20(2007), pp.677-681, in Chinese.

Google Scholar

[6] A. Agah, S. K Das , K Basu . NCA. 2004, p.343 – 346.

Google Scholar

[7] Shengtzong Cheng, Szuyun Li and Chiamei Chen. Seventh IEEE/ACIS International Conference on Computer and Information Science. 2008, pp.401-406.

Google Scholar

[8] Guorui Li, Jingsha He and Yingfang Fu. Computer Communications. Vol. 31(2008), p.4324–4332.

Google Scholar

[9] W. B Heinzelman, A. P Chandrakasan and H. Balakrishnan. IEEE Transactions on Wireless Communications. Vol. 1(2002), pp.660-670.

Google Scholar

[10] Yuanchao Liu, Xiaolong Wang and Bingquan Liu. Chinese High Technology Letters. Vol. 16(2006), pp.11-15, in Chinese.

Google Scholar