[1]廖俊,刘耀宗,姜海涛,等.基于人工免疫的MANET 不端行为检测模型[J].南京理工大学学报(自然科学版),2011,(05):652-658.
 LIAO Jun,LIU Yao-zong,JIANG Hai-tao,et al.Artificial Immunity-based Misbehavior Detection Architecture for Mobile Ad Hoc Networks[J].Journal of Nanjing University of Science and Technology,2011,(05):652-658.
点击复制

基于人工免疫的MANET 不端行为检测模型
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
期数:
2011年05期
页码:
652-658
栏目:
出版日期:
2011-10-31

文章信息/Info

Title:
Artificial Immunity-based Misbehavior Detection Architecture for Mobile Ad Hoc Networks
作者:
廖俊12刘耀宗1姜海涛1张宏1
1. 南京理工大学计算机科学与技术学院,江苏南京210094; 2. 中国药科大学信息管理与信息系统系,江苏南京210009
Author(s):
LIAO Jun12 LIU Yao-zong1 JIANG Hai-tao1ZHANG Hong1
1. School of Computer Science and Technology,NUST,Nanjing 210094,China; 2. Department of Information Management and Information Systems,China Pharmaceutical University,Nanjing 210009,China
关键词:
移动自组织网络 人工免疫 不端行为检测 分簇
Keywords:
mobile ad hoc networks artificial immunity misbehavior detection clustering
分类号:
TP393
摘要:
针对层次ad hoc 网络的结构特点和安全需求,提出了一种基于人工免疫的不端行为检 测系统模型。该模型将不端行为检测数据集分为簇内节点数据集和簇首节点数据集,对其分别 进行二进制编码和数值编码。使用分层的抗原( 不端行为) 动态检测算法,通过簇内节点检测 器行为匹配和簇首节点协作验证判断节点的不端行为。仿真实验表明,当网络中不端节点比率 在0 ~ 40%范围内动态变化时,该模型检测率高于87. 6%,误报率低于1. 01%,说明模型的整体 性能优于DSR-Probe 算法。
Abstract:
To meet the security requirements and the hierarchical characteristics of ad hoc networks, an artificial immunity-based misbehavior detection system( AIMDS) architecture is proposed here. The misbehavior detection datasets of the AIMDS architecture are classified into intra-cluster nodes subsets and cluster-head nodes subsets, and they are performed by binary encoding and numeric encoding respectively. With the intra-cluster node detector match behavior and the cluster-head nodes cooperation,a layered-dynamic detection algorithm of antigens( misbehaviors) is applied to verify the node misbehavior. The simulation results show that,when the misbehavior node rate is 0 ~ 40%, the detection rate and the false-positive rate of the proposed architecture are higher than 87. 6% and lower than 1. 01% respectively, and its performance is better than the DSR-Probe algorithm.

参考文献/References:

[1] Marti Sergio,Giuli T J,Lai Kevin, et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. Proc of the ACM MobiCom[C]. New York,USA: ACM Press, 2000: 255-265.
[2] Buchegger Sonja,Le Boudec Jean-Yves. Performance analysis of the CONFIDANT protocol: Cooperation of nodes: Fairness in distributed ad hoc networks[A]. Proc IEEE/ACM Symp Mobile Ad hoc Networking and Computing( MobiHOC) [C]. IEEE, 2002: 80-91.
[3] Michiardi P,Molva R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[A]. Proc of the Communications and Multimedia Security[C]. Portoroz: IFIP Press,2002: 376-386.
[4] Forrest S,Beauchemin C. Computer immunology[J]. Immunological Reviews, 2007, 216( 1) : 176-197.
[5] Dasgupta D,Gonzalez F. CIDS: An agent-based intrusion detection system[J]. Computers and Security,2005,24 ( 5) : 387-398.
[6] Kim Jungwon,Bentley P,Aickelin Uwe,et al. Immune system approaches to detection—a review intrusion [J]. Natural Computing, 2007,6 ( 4) : 413-466.
[7] Sarafijanovic Slavisa,Le Boudec Jean-Yves. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks[J]. IEEE Transaction on Neural Networks,2005,16 ( 5) : 1076-1087.
[8] William S H. An artificial immune system for securing mobile ad hoc networks against intrusion attacks[A]. Proc of SPIE[C]. Bellingham,USA: SPIE Press, 2003: 74-91.
[9] Hofmery S,Forrest S. Architecture for an artificial immune system [J]. Evolutionary Computation,2000, 7( 1) : 45-68.
[10] 潘志松,倪桂强,谭琳,等. 异常检测中单类分类算 法和免疫框架设计[J]. 南京理工大学学报,2006, 30( 1) : 48-52.
[11] Copt Samuel,Victoria-Feser Maria-Pia. Fast algorithms for computing high breakdown covariance matrices with missing data[A]. Theory and Applications of Recent Robust Methods[C]. Basel,Switzerland: Birkhauser Verlag, 2004: 71-82.
[12] Just M,Kranakis E,Wan T. Resisting malicious packet dropping in wireless ad hoc networks[A]. Proc of ADHOCNOW’ 03[C]. Montreal,Canada: Springer,2003: 151-163.

相似文献/References:

[1]董 萍,钱焕延,兰少华.移动自组织网络多径机会路由算法[J].南京理工大学学报(自然科学版),2013,37(03):6.
 Dong Ping,Qian Huanyan,Lan Shaohua.Opportunistic multipath routing protocol in mobile Ad hoc networks[J].Journal of Nanjing University of Science and Technology,2013,37(05):6.

备注/Memo

备注/Memo:
基金项目: 国家自然科学基金( 90718021) ; 江苏省研究生创新基金( AD20255) 作者简介: 廖俊( 1976-) ,男,博士生,讲师,主要研究方向: 信息安全、移动无线自组织网,E-mail: liaojun@ cpu. edu. cn; 通讯作者: 张宏( 1957-) ,男,教授,博士生导师,主要研究方向: 人工智能与信息安全,E-mail: zhhong@ mail. nujst. edu. cn。
更新日期/Last Update: 2012-10-24