高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于图论的MANET入侵检测方法

张冰涛 王小鹏 王履程 张忠林 李延林 刘虎

张冰涛, 王小鹏, 王履程, 张忠林, 李延林, 刘虎. 基于图论的MANET入侵检测方法[J]. 电子与信息学报, 2018, 40(6): 1446-1452. doi: 10.11999/JEIT170756
引用本文: 张冰涛, 王小鹏, 王履程, 张忠林, 李延林, 刘虎. 基于图论的MANET入侵检测方法[J]. 电子与信息学报, 2018, 40(6): 1446-1452. doi: 10.11999/JEIT170756
ZHANG Bingtao, WANG Xiaopeng, WANG Lücheng, ZHANG Zhonglin, LI Yanlin, LIU Hu. Intrusion Detection Method for MANET Based on Graph Theory[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1446-1452. doi: 10.11999/JEIT170756
Citation: ZHANG Bingtao, WANG Xiaopeng, WANG Lücheng, ZHANG Zhonglin, LI Yanlin, LIU Hu. Intrusion Detection Method for MANET Based on Graph Theory[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1446-1452. doi: 10.11999/JEIT170756

基于图论的MANET入侵检测方法

doi: 10.11999/JEIT170756
基金项目: 

国家自然科学基金(61761027, 61261029, 61662043),兰州交通大学青年基金(2016004)

Intrusion Detection Method for MANET Based on Graph Theory

Funds: 

The National Natural Science Foundation of China (61761027, 61261029, 61662043), The Yong Scholar Fund of Lanzhou Jiaotong University (2016004)

  • 摘要: 移动Ad hoc网络(MANET)易遭受各种安全威胁,入侵检测是其安全运行的有效保障,已有方法主要关注特征选择以及特征权重,而忽略特征间潜在关联性,针对此问题该文提出基于图论的MANET入侵检测方法。首先通过对典型攻击行为分析,合理选择9种特征作为节点,依据欧式距离确定节点间的边以构建结构图。其次发掘节点(即特征)间关联性,综合考虑节点邻居规模属性和节点邻居之间的紧密程度属性,利用图论所对应的统计特性度分布和聚集系数具体实现两属性。最后对比实验结果证明此方法与传统方法相比平均检测率和误检率分别提高10.15%、降低1.8%。
  • 冯涛, 郭显, 马建峰, 等. 可证明安全的节点不相交多路径源路由协议[J]. 软件学报, 2010, 21(7): 1717-1731. doi: 10.3724/ SP.J.1001.2010.03576.
    FENG Tao, GUO Xian, MA Jianfeng, et al. Provably secure approach for multiple node-disjoint paths source routing protocol[J]. Journal of Software, 2010, 21(7): 1717-1731. doi: 10.3724/SP.J.1001.2010.03576.
    VADIVEL R and BHASKARAN V M. Adaptive reliable and congestion control routing protocol for MANET[J]. Wireless Networks, 2016, 23(3): 819-829. doi: 10.1007/s11276-015- 1137-3.
    SINGAL G, LAXMI V, GAUR M S, et al. Multi-constraints link stable multicast routing protocol in MANETs[J]. Ad Hoc Networks, 2017, 63: 115-128. doi: 10.1016/j.adhoc.2017.05. 007.
    INDIRANI G and SELVAKUMAR K. A swarm-based efficient distributed intrusion detection system for mobile Ad hoc networks (MANET)[J]. International Journal of Parallel, Emergent and Distributed Systems, 2014, 29(1): 90-103. doi: 10.1080/17445760. 2013.773001.
    SINDHU S S S, GEETHA S, and KANNAN A. Decision tree based light weight intrusion detection using a wrapper approach[J]. Expert Systems with Applications, 2012, 39(1): 129-141. doi: 10.1016/j.eswa.2011.06.013.
    FIDALCASTRO A and BABURAJ E. Sequential pattern mining for intrusion detection system with feature selection for MANETS[J]. Asian Journal of Research in Social Sciences and Humanities, 2017, 7(2): 428-442. doi: 10.5958/2249-7315. 2017.00100.9.
    李洪成, 吴晓平, 严博. 面向MANET异常检测的分布式遗传k-means研究[J].通信学报, 2015, 36(11): 167-173. doi: 10.11959/j.issn.1000-436x.2015269.
    LI Hongcheng, WU Xiaoping, and YAN Bo. Research on distributed genetic k-means for anomaly detection in MANET[J]. Journal on Communications, 2015, 36(11): 167-173. doi: 10.11959/j.issn.1000-436x.2015269.
    CHUNG Y Y and WAHID N. A hybrid network intrusion detection system using simplified swarm optimization (SSO)[J]. Applied Soft Computing, 2012, 12(9): 3014-3022. doi: 10.1016/j.asoc.2012.04.020.
    LI Xiaojin, HU Xintao, JIN Changfeng, et al. A comparative study of theoretical graph models for characterizing structural networks of human brain[J]. International Journal of Biomedical Imaging, 2013, 13(1): 27-35. doi: 10.1155/2013/201735.
    ZHU Guohun, LI Yan, and WEN P P. Analysis and classification of sleep stages based on difference visibility graphs from a single-channel EEG signal[J]. IEEE Journal of Biomedical Health Informatics, 2014, 18(6): 1813-1821. doi: 10.1109/JBHI.2014.2303991.
    ZHANG Xiaowei, HU Bin, MA Xu, et al. Ontology driven decision support for the diagnosis of mild cognitive impairment[J]. Computer Methods and Programs in Biomedicine, 2014, 113(3): 781-791. doi: 10.1016/j.cmpb. 2013.12.023.
    包振, 何迪. 一种基于图论的入侵检测方法[J]. 上海交通大学学报, 2010, 44(9): 1176-1180.
    BAO Zhen and HE Di. An intrusion detection method based on graph theory[J]. Journal of Shanghai Jiaotong University, 2010, 44(9): 1176-1180.
    MITROKOTSA A and DIMITRAKAKIS C. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection[J]. Ad Hoc Networks, 2013, 11(1): 226-237. doi: 10.1016/j.adhoc.2012.05.006.
    严蔚敏, 陈文博. 数据结构及应用算法教程(修订版)[M]. 北京: 清华大学出版社, 2011: 201-202.
    YAN Weimin and CHEN Wenbo. Data Structure and Application Algorithm Tutorial(Revised Edition)[M]. Beijing: Tsinghua University Press, 2011: 201-202.
    TAKIGUCHI J, LWAMA K, KOZAKI M, et al. A study of autonomous mobile system in outdoor environment[J]. IFAC Computer Aided Control Systems, 1997, 30(4): 61-66. doi: 10.1016/S1474-6670(17)43613-5.
    王林, 戴冠中. 复杂网络的度分布研究[J]. 西北工业大学学报, 2006, 24(4): 405-409.
    WANG Lin and DAI Guanzhong. On degree distribution of complex network[J]. Journal of Northwestern Polytechnical University, 2006, 24(4): 405-409.
    任卓明, 邵凤, 刘建国, 等. 基于度与集聚系数的网络节点重要性度量方法研究[J]. 物理学报, 2013, 62(12): 522-526. doi: 10.7498/aps.62.128901.
    REN Zhuoming, SHAO Feng, LIU Jianguo, et al. Node importance measurement based on the degree and clustering coefficient information[J]. Acta Physica Sinica, 2013, 62(12): 522-526. doi: 10.7498/aps.62.128901.
    ZHANG Xiaowei, HU Bin, MA Xu, et al. Resting-State whole-brain functional connectivity networks for MCI classification using L2-Regularized logistic regression[J]. IEEE Transactions on Nanobioscience, 2015, 14(2): 237-247. doi: 10.1109/TNB.2015.2403274.
    李玲娟, 徐向凯, 王汝传. MANET的IDS中移动代理部署算法的研究[J]. 南京邮电大学学报(自然科学版), 2006, 26(3): 52-57.
    LI Lingjuan, XU Xiangkai, and WANG Ruchuan. Research of the mobile agent disposal algorithm in MANET IDS[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2006, 26(3): 52-57.
  • 加载中
计量
  • 文章访问数:  1666
  • HTML全文浏览量:  201
  • PDF下载量:  157
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-07-25
  • 修回日期:  2018-02-28
  • 刊出日期:  2018-06-19

目录

    /

    返回文章
    返回