An Intrusion Detection Method for Wireless Sensor Networks Based on Support Vector Machine

A wireless sensor network and support vector machine technology, applied in wireless communication, network topology, transmission system and other directions, can solve the problems of unusable, occupying too much system resources, etc., to achieve small data volume, low complexity, fast speed Effect

Active Publication Date: 2018-01-26
HUAZHONG UNIV OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the existing technology of intrusion detection of wireless sensor network, such as the invention patent application (CN201510606829.0), "Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)" 2016 No. 1 paper "Intrusion detection of wireless sensor network based on information entropy Genetic Algorithm" is to analyze the header information of all packets, and then extract network features and detect attacks; this type of method can work normally when the network scale is small, but in large-scale, large-scale wireless The network will be unavailable due to taking up too many system resources
In order to reduce the power consumption of sensors as much as possible, more and more wireless sensor networks adopt the event-triggered communication mode. Sensors do not usually send data, and only transmit information to the cluster head node when a specific event is detected; compared to The working mode of periodic polling, event triggering will bring more uncertain factors to the network, making the network traffic in the system bursty; how to detect attacks in a heterogeneous environment with both periodic polling and event triggering is a huge challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Intrusion Detection Method for Wireless Sensor Networks Based on Support Vector Machine
  • An Intrusion Detection Method for Wireless Sensor Networks Based on Support Vector Machine
  • An Intrusion Detection Method for Wireless Sensor Networks Based on Support Vector Machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0067] The wireless sensor network intrusion detection method based on the support vector machine provided by the present invention first establishes a traffic model for the wireless sensor network to accurately describe the system network traffic behavior; with the help of the traffic model, a smaller set of characteristic parameters can be extracted To effectively describe the operating state ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network intrusion detection method based on a support vector machine. Firstly, the flow model of the system network is described by establishing a flow model of the wireless sensor network, and flow characteristics are extracted from network data flow packets according to the flow model. Parameters, and normalize the traffic characteristic parameters; train the support vector machine through the above traffic characteristic parameters, and learn the traffic pattern of the system network; use the trained support vector machine to perform online intrusion detection; the wireless network provided by the present invention The sensor network intrusion detection method uses the network traffic model to extract the operating status parameters of the wireless sensor network. It does not need to analyze the network packets in depth, and only needs to extract a small number of characteristic parameters to achieve real-time intrusion detection, and can be used in general Intrusion detection of polling and event-triggered wireless sensor networks; while ensuring practicability, it greatly improves the detection rate and reduces the false alarm rate.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor network information security protection, and more specifically relates to a support vector machine-based wireless sensor network intrusion detection method. Background technique [0002] With the rapid development of wireless transmission technology, low-power processors and embedded computing technology, wireless sensor networks have been more and more widely used; since the sensors of wireless sensor networks are mostly deployed in unattended environments, it is easy to suffer malicious cyber attacks. As an intelligent system that can actively discover attacks and provide alarm information, the intrusion detection system can be used as the second line of defense of the system. [0003] Existing technologies for intrusion detection of wireless sensor networks, such as the invention patent application (CN201510606829.0), "Journal of Chongqing University of Posts and Telecommunications (Na...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24H04W12/12H04W12/121
CPCH04L41/145H04L43/103H04L63/1416H04W12/12H04W84/18
Inventor 周纯杰黄开兴彭源秦元庆涂伟勋
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products