Double-layer trigger intrusion detection method based on flow prediction

A technology for intrusion detection and traffic prediction, applied in advanced technology, security devices, electrical components, etc., can solve problems such as long training time and a large number of training samples

Inactive Publication Date: 2015-01-21
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Tian et al. proposed a community intrusion detection system based on support vector machine (SVM). This scheme optimizes the parameters of SVM by using genetic algorithm, thereby enhancing the algorithm convergence speed and recognition accuracy. Due to its high classification ability and effective learning Ability and generalization ability, the algorithm has a high accuracy rate, the disadvantage is that the algorithm needs a large number of training samples, and the training time is long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-layer trigger intrusion detection method based on flow prediction
  • Double-layer trigger intrusion detection method based on flow prediction
  • Double-layer trigger intrusion detection method based on flow prediction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings.

[0062] The invention proposes a double-layer trigger intrusion detection method based on traffic prediction technology in a wireless sensor network. The structure of the intrusion detection system in the wireless sensor network is as follows figure 2 The sensor nodes in the shown wireless sensor network are divided into several areas by the monitoring nodes, and the nodes within the detection radius of the same monitoring node belong to the same area. Since the detection ranges of different monitoring nodes may overlap, the areas divided according to the detection radius of the monitoring nodes may also overlap. Any node in the network belongs to at least one area. The entire network consists of the following 4 elements:

[0063] Ordinary node: sensor node, which is an ordinary node with built-in local intrusion detection system;

[0064] Convergence node: sink no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a double-layer trigger intrusion detection method based on flow prediction. A lower-layer model is triggered according to a certain rule only when it is detected that an upper-layer model is abnormal and an abnormal area occurs, so that energy use of nodes is reduced and accuracy of detection results can be guaranteed. The method includes the step of data collecting, the step of data analysis, the step of triggering and judgment and the step of starting of a local intrusion detection model, wherein in the step of data collecting, a monitoring node periodically collects data flow information in a network and transmits the information to a base station; in the step of data analysis, the base station receives the information sent by the monitoring mode and then carries out flow prediction on historical data of the monitoring node according to an ARIMA model; in the triggering and judgment step, the base station sends an abnormity alarm to a sink node when the difference between a flow prediction value and a true value exceeds a preset threshold, and a local intrusion detection system is started in the abnormal area; in the step of starting of the local intrusion detection model, when the sink node receives the abnormity alarm, a second-layer intrusion detection model, namely a local intrusion monitoring model, is started in sink nodes and common nodes of areas, where abnormity occurs, in the alarm.

Description

technical field [0001] The invention relates to a flow prediction-based double-layer trigger intrusion detection method, which belongs to the field of wireless sensor networks. Background technique [0002] The research on intrusion detection can be traced back to the work of James P.Anderson in 1980. He proposed terms such as "threat" for the first time. The "threat" referred to here is basically the same as the meaning of intrusion. Unreliable, deliberate, unauthorized access attempts that render the system unreliable or unusable. In 1987, Dorothy Denning of Georgetown University first proposed the definition of intrusion detection: an intrusion detection system consists of three components, the information collection component completes the collection of network information; the detection component completes the analysis and detection of the collected information; the response module Intrusion behavior to take certain measures. The framework of an intrusion detection sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W24/00
CPCH04W12/12H04W24/02Y02D30/70
Inventor 张冬梅郑康锋高大永武斌伍淳华周杨查选
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products