An Intrusion Detection Model Based on Danger Theory for Wireless Sensor Networks

被引:2
作者
Li, Linlin [1 ]
Sun, Liangxu [1 ]
Wang, Gang [1 ]
机构
[1] Univ Sci & Technol Liaoning, Coll Software, Anshan, Peoples R China
关键词
Intrusion Detection; Wireless Sensor Networks; Danger Theory; Extreme Learning Machine; Projection Pursuit; Beta Distribution;
D O I
10.3991/ijoe.v14i09.8625
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For the intrusion detection problem in Wireless Sensor Networks, an intrusion detection model based on the Danger Theory is proposed. The model has two layers including danger perception and control decision and detects intrusion by a multi-node cooperation mechanism. The model uses Danger Theory instead of SNS as the artificial immune theory basic, perceives dangers with Projection Pursuit Algorithm to handle the high dimension problem of network traffic information, classifies dangers with Extreme Learning Machine algorithm and uses Beta distribution trust evaluation to ensure the trust between nodes. By the simulations in the MATLAB with KDD CUP99 dataset, it is proved that the danger perception with Projection Pursuit Algorithm is effective, the classification speed of ELM algorithm is faster than SVM algorithm, the proposed model based on Danger Theory is better than the SNS model at the aspects of false negative rate, false positive rate and energy consumption.
引用
收藏
页码:53 / 65
页数:13
相关论文
共 16 条
[1]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[2]   AUTO-IMMUNE DISEASE .1. MODERN IMMUNOLOGICAL CONCEPTS [J].
BURNET, M .
BMJ-BRITISH MEDICAL JOURNAL, 1959, 2 (OCT10) :645-650
[3]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[4]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[5]  
Ge X., 2015, TRANSDUCER MICROSYST, V9, P34
[6]   A survey on energy efficient intrusion detection in wireless sensor networks [J].
Ghosal, Amrita ;
Halder, Subir .
JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2017, 9 (02) :239-261
[7]   Extreme learning machine: Theory and applications [J].
Huang, Guang-Bin ;
Zhu, Qin-Yu ;
Siew, Chee-Kheong .
NEUROCOMPUTING, 2006, 70 (1-3) :489-501
[8]   Multi-agent trust-based intrusion detection scheme for wireless sensor networks [J].
Jin, Xianji ;
Liang, Jianquan ;
Tong, Weiming ;
Lu, Lei ;
Li, Zhongwei .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :262-273
[9]   TOLERANCE, DANGER, AND THE EXTENDED FAMILY [J].
MATZINGER, P .
ANNUAL REVIEW OF IMMUNOLOGY, 1994, 12 :991-1045
[10]  
Rimiru RM, 2014, INT J UNCONV COMPUT, V1-2, P10