Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Support-vector-machine-based intrusion detection method for wireless sensor network

A wireless sensor network and support vector machine technology, applied in wireless communication, network topology, transmission system and other directions, can solve the problems of unusable, occupying too much system resources, etc., to achieve the effect of small data volume

Active Publication Date: 2017-04-05
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the existing technology of intrusion detection of wireless sensor network, such as the invention patent application (CN201510606829.0), "Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)" 2016 No. 1 paper "Intrusion detection of wireless sensor network based on information entropy Genetic Algorithm" is to analyze the header information of all packets, and then extract network features and detect attacks; this type of method can work normally when the network scale is small, but in large-scale, large-scale wireless The network will be unavailable due to taking up too many system resources
In order to reduce the power consumption of sensors as much as possible, more and more wireless sensor networks adopt the event-triggered communication mode. Sensors do not usually send data, and only transmit information to the cluster head node when a specific event is detected; compared to The working mode of periodic polling, event triggering will bring more uncertain factors to the network, making the network traffic in the system bursty; how to detect attacks in a heterogeneous environment with both periodic polling and event triggering is a huge challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Support-vector-machine-based intrusion detection method for wireless sensor network
  • Support-vector-machine-based intrusion detection method for wireless sensor network
  • Support-vector-machine-based intrusion detection method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0067] The wireless sensor network intrusion detection method based on the support vector machine provided by the present invention first establishes a traffic model for the wireless sensor network to accurately describe the system network traffic behavior; with the help of the traffic model, a smaller set of characteristic parameters can be extracted To effectively describe the operating state ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a support-vector-machine-based intrusion detection method for a wireless sensor network. A flow pattern of a wireless sensor network is established to describe a flow mode of a system network, a flow characteristic parameter is extracted from a network data flow packet according to the flow model and is processed by normalization; on the basis of the flow characteristic parameter, a support vector machine is trained and a flow mode of the system network is learned; and on-line intrusion detection is carried out by using the trained support vector machine. According to the intrusion detection method disclosed by the invention, the operation state parameter of the wireless sensor network is extracted by using the network flow model; real-time intrusion detection can be realized only by extracting a few of characteristic parameters without deep parsing on a network message. Moreover, the method is also suitable for cyclic polling type and event trigger type wireless sensor network intrusion detection. While the real-time performance is guaranteed, the detection rate is improved substantially and the false alarm rate is reduced.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor network information security protection, and more specifically relates to a support vector machine-based wireless sensor network intrusion detection method. Background technique [0002] With the rapid development of wireless transmission technology, low-power processors and embedded computing technology, wireless sensor networks have been more and more widely used; since the sensors of wireless sensor networks are mostly deployed in unattended environments, it is easy to suffer malicious cyber attacks. As an intelligent system that can actively discover attacks and provide alarm information, the intrusion detection system can be used as the second line of defense of the system. [0003] Existing technologies for intrusion detection of wireless sensor networks, such as the invention patent application (CN201510606829.0), "Journal of Chongqing University of Posts and Telecommunications (Na...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26H04L12/24H04W12/12H04W12/121
CPCH04L41/145H04L43/103H04L63/1416H04W12/12H04W84/18
Inventor 周纯杰黄开兴彭源秦元庆涂伟勋
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products