Routing Attacks Detection Method of Wireless Sensor Network

被引:0
作者
Li, Yongzhong [1 ]
Du, Miao [1 ]
Li, Yi [1 ]
机构
[1] Jiangsu Univ Sci & Technol, Sch Comp Sci, Zhenjiang, Peoples R China
来源
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018) | 2018年 / 306卷
关键词
Wirelesssensor networks; PSO; K-means clustering; Intrusion detection system;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is a critical challenge for creating robust and reliable sensor networks. For the particularity and security threats of wireless sensor networks, we proposed an anomaly detection method based on particle swarm optimization K-means clustering algorithm to detect routing attacks caused by abnormal flows in this paper. K-means clustering algorithm is an effective method has been proved for apply to the intrusion detection system, but it is a part of the optimal solution, rather than the overall optimal solution. Particle swarm optimization (PSO) algorithm which is evolutionary computation technology based on swarm intelligence has good global search ability. With the deficiency of global search ability for K-means clustering algorithm, K-means clustering algorithm based on particle swarm optimization (PSO-KM) is proposed in this paper. This algorithm could overcome falling into local minima and has relatively good overall convergence. Experiments on data sets KDD CUP 99 validate the effectiveness of the proposed method and show that the method has higher detection rate and lower false detection rate.
引用
收藏
页码:255 / 265
页数:11
相关论文
共 15 条
[1]  
Chimphlee W, 2005, INDICON 2005 PROCEEDINGS, P575
[2]  
Eberhart R., 1995, MHS95 P 6 INT S MICR, DOI [DOI 10.1109/MHS.1995.494215, 10.1109/MHS.1995.494215]
[3]  
Eberhart R.C., 2001, Swarm Intelligence
[4]  
Krishnapuram R., 1993, IEEE Transactions on Fuzzy Systems, V1, P98, DOI 10.1109/91.227387
[5]  
[李永乐 LI Yongle], 2007, [实验流体力学, Journal of Experiments in Fluid Mechanics], V21, P36
[6]   A new intrusion detection method based on Fuzzy HMM [J].
Li, Yongzhong ;
Ge, Yang ;
Jing, Xu ;
Bo, Zhao .
ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, :36-39
[7]  
Li Yongzhong, 2006, Computer Engineering, V32, P159
[8]  
Li Yongzhong, 2006, J COMPUTER RES DEV, V43, P296
[9]  
LI Yongzhong, 2008, J JIANGSU U SCI TECH, V22, P52
[10]  
Luo Min, 2003, RES INTRUSION DETECT