Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A mobile sensor network intrusion detection and adaptive response method

A technology of network intrusion detection and mobile sensors, applied in transmission systems, electrical components, security devices, etc., can solve problems such as network intrusion attacks that cannot be solved

Inactive Publication Date: 2021-05-25
HEILONGJIANG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the existing intrusion attacks on mobile sensor networks often focus on the targeted detection of a certain attack, and the defense method also has clear directionality, which cannot solve the problem of network uncertainty intrusion attacks. A mobile sensor network intrusion detection and adaptive response method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile sensor network intrusion detection and adaptive response method
  • A mobile sensor network intrusion detection and adaptive response method
  • A mobile sensor network intrusion detection and adaptive response method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0030]DETAILED DESCRIPTION OF THE INVENTION First: The specific process of moving sensor network intrusion detection and adaptive response method is:

[0031]Step 1. Monitor the network and collect data;

[0032]Step 2, the collected data is processed, and the processed data is stored in the initial configuration file (ITP);

[0033]Step 3, based on step two, management nodes use the parameters in the network feature matrix, adopt an invasion in the network based on abnormal intrusion detection method;

[0034]Step 4. Based on step three to calculate the attack trust value (ACV) and network performance degradation values ​​(NP); establish an adaptive intrusion response behavior list according to the attack trust value (ACV) and network performance degradation value (NP); based on attack trust The degree level, network performance degradation level and adaptive intrusion response behavior list establish a decision table, select intrusion response based on the established decision table. Such asf...

specific Embodiment approach 2

[0041]DETAILED DESCRIPTION OF THE INVENTION Different from the specific embodiment, the steps are monitored and collected in the steps; the specific process is:

[0042]figure 1 The first step is to collect network monitoring and data collection. Idarm provides intrusion detection and protection in the life cycle of the entire network, which will periodically collect data in the network to achieve monitoring of the entire network.

[0043]Collecting data refers to the cluster header data from the cluster node from their virtual cluster; these data are stored in the form of a web feature matrix and performance matrix;

[0044]The cluster head reports the network feature matrix and performance matrix to the management node;

[0045]The network feature matrix is ​​composed of sequences of routing reply, routing requests, routing errors, survival values, routing request sources, routing replies, and routing request destination sequences; (detects directly with data);

[0046]The network feature matrix...

specific Embodiment approach 3

[0056]DETAILED DESCRIPTION OF THE INVENTION The present embodiment is different from that of the specific embodiment, and the collected data is processed in the second step, which is stored in the initial configuration file (ITP); the specific process is :

[0057]The cluster head is constantly collecting data from the cluster node from their virtual clusters; these data is stored in the form of a matrix in the network feature matrix and performance matrix; the cluster head will use the network feature matrix and performance within a fixed time interval. Matrix report to the management node;

[0058]The expected value of the network feature matrix isIndicated thatIt is a set of random variables representing the network feature matrix;

[0059]Where A represents the first time interval, b represents the number B parameter of the network feature matrix, and the number of random variables in the third parameters of the network feature matrix, 1 ≤ C ≤ M, M is in the first time interval network T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile sensor network intrusion detection and adaptive response method relates to a mobile sensor network intrusion detection and adaptive response method. The purpose of the present invention is to solve the existing intrusion attacks on the mobile sensor network, which often focus on the targeted detection of a certain attack, and the defense methods also have clear directionality, which cannot solve the problem of network uncertainty intrusion attacks. The process is: 1. Monitor the network and collect data; 2. Process the collected data, and store the processed data in the initial configuration file; Identify the intrusion in the network with the intrusion detection method based on the method; Fourth, establish a decision table based on the attack confidence level, the network performance degradation level and the adaptive intrusion response behavior list, and select the intrusion response according to the established decision table. The invention is used in the field of security protection of mobile sensor networks.

Description

Technical field[0001]The present invention relates to the safety protection field of mobile sensor networks, and specific relates to a mobile sensor network intrusion detection and self-response method.Background technique[0002]The mobile sensor network is constructed from the mobility terminal with a dynamic topology network form, widely used in various fields of military or civilian. Whether it is sensitive information transmission in the military domain, or private information processing in the civilian field, mobile sensor network lacks centralized control, dynamic topology and energy restricted features make network layers are easy to suffer from multiple attacks, such as black hole attacks, gray holes Attack, flooding attacks and acute attacks, etc. Give users a big security hazard. Therefore, the threat of mobile sensor networks in terms of security must be resolved. If in the process of communication, it is difficult to rely on encryption technology and authentication techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/121H04W12/122
CPCH04L63/1416H04W12/12H04L63/1458
Inventor 秦丹阳赵敏徐广超马宏斌王英丽
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products