Distributed intrusion detection method and system for ad hoc network

An intrusion detection and self-organizing network technology, applied in the field of network security, can solve problems such as complex data types, limitations in processing and detection capabilities, and decision-making errors, achieve accurate intrusion detection, avoid malicious interference, and ensure authenticity and reliability. sexual effect

Active Publication Date: 2018-07-20
PEKING UNIV SHENZHEN GRADUATE SCHOOL
View PDF9 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the network-based intrusion detection system and the host-based intrusion detection system have relatively complex data types when the network scale is relatively large. and the ability to respond to intrusions
Therefore, distributed intrusion detection systems have been more widely studied and applied. However, most of the existing distributed intrusion detection methods are to set up detection components to collect information on each network node, and send the collected information to the central processing Nodes for analysis and processing, which rely on central processing nodes, limited processing and detection capabilities, and are not suitable for scenarios without central processing nodes
[0004] The invention patent with the application number of 200810041454.8 proposes a wireless self-organizing network intrusion detection method. This method implements intrusion detecti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed intrusion detection method and system for ad hoc network
  • Distributed intrusion detection method and system for ad hoc network
  • Distributed intrusion detection method and system for ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0033] Blockchain (Blockchain) technology, as a decentralized distributed ledger technology, has a traceable, non-tamperable and timed data structure, and its distributed consensus maintains trust among multiple parties.

[0034] In the embodiment of the present invention, multiple nodes in the ad hoc network are divided into at least one cluster, and then the cluster head node of each cluster is selected as an agent for intrusion detection, and then the block chain system is configured on all the cluster head nodes, Form a blockchain network; when the log of a node is updated, the node sends a transaction request to the cluster head node of the cluster to which it belongs to request the blockchain system to verify and record, and the cluster head node receives the transaction request sent by the requesting node containing the The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed intrusion detection method and system for an ad hoc network. Nodes in the ad hoc network are clustered and cluster head nodes are selected, block chain systems are configured at all the cluster head node to form a block chain network, and the method includes the following steps: a node where a log is updated sends to the cluster head node thereof a transaction request containing a log information record which is formatted locally at the node; the cluster head node broadcasts the transaction in the block chain network after verifying that the transaction is legal; each cluster head node performs consensus verification of the transaction, after passing the consensus verification, the transaction is packed to be recorded to the block chain to form a shared log data; and each cluster head node executes intrusion detection based on local information and the shared log data. Since consensus verification and recording are performed on the log informationrecord, authenticity and reliability of detection data are ensured, globally reliable shared information records and safety audit data are provided for the centerless weakly-trusted ad hoc network, so as to support global decision making and response, thereby enabling intrusion detection to be more accurate.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a distributed intrusion detection method and system for an ad hoc network. Background technique [0002] In recent years, ad hoc networks have developed rapidly. They have the characteristics of fast networking, easy deployment, and no dependence on fixed infrastructure. They have been widely used in military communications, mobile networks, and emergency services. Ad hoc networks such as wireless sensor networks and Internet of Vehicles. But with the rapid development of ad hoc networks, network security is becoming more and more important. Intrusion Detection System IDS (Intrusion Detection System) is the second line of defense to protect system security after the firewall. It collects and analyzes network logs and audit data to detect whether there are operations in violation of security policies and malicious attacks launched in the ad hoc network. Nodes, and notif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04W84/18G06Q40/04
CPCH04L63/1425H04L63/1441H04L67/1097H04W84/18G06Q40/04H04L67/56
Inventor 雷凯齐竹云章奇超楼君俊
Owner PEKING UNIV SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products