Safety detection algorithm in sensor network based on ant colony optimization with improved multiple clustering algorithms

被引:5
作者
Zhu, Limin [1 ]
机构
[1] Henan Inst Technol, Lab Management Ctr, Xinxiang 453000, Henan, Peoples R China
关键词
Sensing network attack; Spatial clustering; K-means clustering; Ant colony optimization; Data fusion; Evidence accumulation; CLASSIFICATION;
D O I
10.1016/j.ssci.2019.05.012
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Sensing network attack connection has the characteristics of behavioral variability and complexity. It is not feasible to construct an abnormal intrusion detection model by using behavior mining technology based on traditional clustering. According to the characteristics of Sensing network attack behavior, this paper proposed a Sensing network attack detection algorithm based on improved multi-cluster. Firstly, it used improved spatial clustering algorithm to reduce spatial data feature dimensions and feature computational complexity during attack detection. Secondly, it used improved K-means clustering algorithm to classify spatial datasets. Ant colony optimization algorithm is used to detect whether there is Sinkhole attack in routing and generate alert information of sensor nodes. Finally, it used improved evidence accumulation clustering algorithm to calculate the difference distance between each isolated point and the cluster centroid and it also used matrix clustering algorithm to calculate the detection threshold and determine the attack behavior in the Sensing network. P2P trust model is used to calculate the trust value of each node in the list of suspect nodes, and the node whose trust value is lower than the preset threshold is regarded as the attack node. Through the attack detection experiment based on KDD 99 dataset, the comparison with the detection results of different algorithm s shows that the proposed algorithm has higher detection rate and lower false positive rate.
引用
收藏
页码:96 / 102
页数:7
相关论文
共 17 条
  • [1] Characterization of focal EEG signals: A review
    Acharya, U. Rajendra
    Hagiwara, Yuki
    Deshpande, Sunny Nitin
    Suren, S.
    Koh, Joel En Wei
    Oh, Shu Lih
    Arunkumar, N.
    Ciaccio, Edward J.
    Lim, Choo Min
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 290 - 299
  • [2] Classification of focal and non focal EEG using entropies
    Arunkumar, N.
    Ramkumar, K.
    Venkatraman, V.
    Abdulhay, Enas
    Fernandes, Steven Lawrence
    Kadry, Seifedine
    Segal, Sophia
    [J]. PATTERN RECOGNITION LETTERS, 2017, 94 : 112 - 117
  • [3] Entropy-based denial-of-service attack detection in cloud data center
    Cao, Jiuxin
    Yu, Bin
    Dong, Fang
    Zhu, Xiangying
    Xu, Shuai
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (18) : 5623 - 5639
  • [4] Compute pairwise Manhattan distance and Pearson correlation coefficient of data points with GPU
    Chang, Dar-Jen
    Desoky, Ahmed H.
    Ouyang, Ming
    Rouchka, Eric C.
    [J]. SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 501 - 506
  • [5] Discrimination of Mine Seismic Events and Blasts Using the Fisher Classifier, Naive Bayesian Classifier and Logistic Regression
    Dong, Longjun
    Wesseloo, Johan
    Potvin, Yves
    Li, Xibing
    [J]. ROCK MECHANICS AND ROCK ENGINEERING, 2016, 49 (01) : 183 - 211
  • [6] Duarte F. J. F., 2015, P INT WORKSH PATT RE, P104
  • [7] Dubey A.K., 2016, INT J COMPUTER ASSIS, V16, P1
  • [8] Jan MA, 2015, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, P318, DOI [10.1109/Trustcom-2015.390, 10.1109/Trustcom.2015.390]
  • [9] Juang B. H., 2013, BELL LABS TECH J, V64, P391
  • [10] An efficient intrusion detection system based on support vector machines and gradually feature removal method
    Li, Yinhui
    Xia, Jingbo
    Zhang, Silan
    Yan, Jiakai
    Ai, Xiaochuan
    Dai, Kuobin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) : 424 - 430