Intrusion detection method and device thereof in self-organized network

A self-organizing network, intrusion detection technology, applied in the direction of network topology, electrical components, wireless communication, etc., to achieve the effect of improving the detection speed

Inactive Publication Date: 2009-12-23
HUAWEI TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Table 2 The detection rate and false detec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and device thereof in self-organized network
  • Intrusion detection method and device thereof in self-organized network
  • Intrusion detection method and device thereof in self-organized network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as image 3 As shown, the intrusion detection method in the Ad Hoc network of the embodiment of the present invention comprises:

[0037] S31. Receive data and acquire features of the data, and form the features into an original feature set;

[0038] S32. Based on the information gain, group the features in the original feature set to obtain each feature group;

[0039] S33. Based on the minimum classification error decision criterion of the support vector machine, use the support vector machine to select the optimal feature subset from each feature group;

[0040] S34. Analyze the optimal feature subset to determine whether it has been invaded.

[0041] For example, the situation of the ad hoc network being invaded includes: whether the node is intercepted, whether the key held by the enemy node pretends to be a legitimate node and joins the network, etc. Optionally, step S34 may refer to the process of selecting and obtaining a feature subset through a genetic...

Embodiment 2

[0086] Such as Figure 6 As shown, the embodiment of the present invention provides an intrusion detection device 600 in an Ad Hoc network, including:

[0087] The feature grouping unit 601 is configured to receive data and acquire features of the data, form the features into an original feature set, group the features in the original feature set based on information gain, and send the obtained feature groups to To the optimal feature subset screening unit 602;

[0088] The optimal feature subset screening unit 602 is configured to receive the feature groups sent by the feature grouping unit 601, and use a support vector machine to filter from the feature groups based on the minimum classification error decision criterion of the support vector machine. An optimal feature subset, and sending the optimal feature subset to the detection unit 603;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an intrusion detection method and a device thereof in a self-organized network, which belong to the field of wireless networks and can improve the detection speed on the premise of ensuring the detection accuracy. The intrusion detection method in the self-organized network comprises the following steps of: receiving data, acquiring data characteristics and constituting the characteristics into an original characteristic set; dividing the characteristics in the original characteristic set into groups based on information gain to obtain all characteristic groups; adopting a support vector machine to screen an optimal characteristic subset from all characteristic groups based on a minimum classification error judgment principle of the support vector machine; and analyzing the optimal characteristic subset and judging whether the network is intruded. The invention can be used for improving the detection speed on the premise of ensuring the detection accuracy.

Description

technical field [0001] The invention relates to the field of wireless networks, in particular to an intrusion detection method and equipment in an ad hoc network. Background technique [0002] The difference between the self-organizing (Ad Hoc) network and the fixed wired network causes the intrusion detection system (IntrusionDetection System, IDS) to face different problems in the Ad hoc network. First, the Ad hoc network has no fixed infrastructure, so IDS cannot collect good statistics. At any time, statistical data is limited to communication activities within a specific wireless transmission range, which requires IDS to be based on partial, local information. Second, the communication link of the Ad hoc network has the characteristics of low speed, limited bandwidth, high bit error, and limited power supply energy. Link breakage is very common in wireless transmission, which requires the implementation of IDS to consider these factors. Third, in Ad hoc networks, ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W84/18H04W12/121H04W12/122
Inventor 刘培徐平平殷慧琳杨小勇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products