The Research and Simulation on Optimization Method for Diverse Network Intrusions

Article Preview

Abstract:

In current complex network environment, various kinds of attacks are mixed together forming the attack group. The diversity of the attack group leads to diverse attack signatures, which cannot be constrained by uniform conditions. Based on mixed attack signatures estimation model, the paper proposes a detection method for mixed and diverse attack groups. The paper classifies the different attacks in the mixed and diverse attack groups by use of attack constraint classification methods, builds invasion recognition particle tree, and detects mixed diverse attack groups in complex network environment according to error estimation. Experimental results show that the algorithm can effectively improve the accuracy of detection in complex network environment. atures;

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5740-5743

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. CACM, June 2004, 47: 53–57.

Google Scholar

[2] Anjum F, Subhadrabandhu D, Sarkar S, et al. On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks. Washington: IEEE Press , 2004: 433–439.

DOI: 10.1109/broadnets.2004.52

Google Scholar

[3] Everthon Silva Fonseca, Rodrigo Capobianco Guido, Paulo Rogério Scalassara, Carlos Dias Maciel, José Carlos Pereira. Wavelet time-frequency analysis and least squares support vector machines for the identification of voice disorders[J]. Computers in Biology and Medicine, 2007, 37(4): 571-578.

DOI: 10.1016/j.compbiomed.2006.08.008

Google Scholar

[4] Qing Li, Zhu Qingxin, Wang Mingwen. A distributed energy-efficient clustering algorithm for heterogeneous wireless sensor network [J]. Journal of Software, 2006, 17(3): 481-489.

DOI: 10.1360/jos170481

Google Scholar