Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Wireless sensor network intrusion detection system based on sequence model
CHENG Xiaohui, NIU Tong, WANG Yanjun
Journal of Computer Applications    2020, 40 (6): 1680-1684.   DOI: 10.11772/j.issn.1001-9081.2019111948
Abstract361)      PDF (656KB)(374)       Save
With the rapid development of Internet of Things (IoT), more and more IoT node devices are deployed, but the accompanying security problem cannot be ignored. Node devices at the network layer of IoT mainly communicate through wireless sensor networks. Compared with the Internet, they are more open and more vulnerable to network attacks such as denial of service. Aiming at the network layer security problem faced by wireless sensor networks, a network intrusion detection system based on sequence model was proposed to detect and alarm the network layer intrusion, which achieved higher recognition rate and lower false positive rate. Besides, aiming at the security problem of the node host device faced by wireless sensor network node devices, with the consideration of the node overhead, a host intrusion detection system based on simple sequence model was proposed. The experimental results show that, the two intrusion detection systems for the network layer and the host layer of wireless sensor network both have the accuracy more than 99%, and the false detection rate about 1%, which meet the industrial requirements. These two proposed systems can comprehensively and effectively protect the wireless sensor network security.
Reference | Related Articles | Metrics
Multi-constraints deadline-aware task scheduling heuristic in virtual clouds
ZHANG Yi, CHENG Xiaohui, CHEN Liuhua
Journal of Computer Applications    2017, 37 (10): 2754-2759.   DOI: 10.11772/j.issn.1001-9081.2017.10.2754
Abstract565)      PDF (967KB)(422)       Save
Many existing scheduling approaches in cloud data centers try to consolidate Virtual Machines (VMs) by VM live migration technique to minimize the number of Physical Machines (PMs) and hence minimize the energy consumption, however, it introduces high migration overhead; furthermore, the cost factor that leads to high payment cost for cloud users is usually not taken into account. Aiming at energy reduction for cloud providers and payment saving for cloud users, as well as guaranteeing the deadline of user tasks, a heuristic task scheduling algorithm called Energy and Deadline-Aware with Non-Migration Scheduling (EDA-NMS) was proposed. The execution of the tasks that have loose deadlines was postponed to avoid waking up new PMs and migration overhead, thus reducing the energy consumption. The results of extensive experiments show that compared with Proactive and Reactive Scheduling (PRS) algorithm, by selecting a smart VM combination scheme, EDA-NMS can reduce the static energy consumption and ensure the lowest payment with meeting the deadline requirement for key user tasks.
Reference | Related Articles | Metrics
Clustering-based approach for multi-level anonymization
GUI Qiong CHENG Xiaohui
Journal of Computer Applications    2013, 33 (02): 412-416.   DOI: 10.3724/SP.J.1087.2013.00412
Abstract883)      PDF (842KB)(385)       Save
To prevent the privacy disclosure caused by linking attack and reduce information loss resulting from anonymous protection, a (λα,k) multi-level anonymity model was proposed. According to the requirement of privacy preservation, sensitive attribute values could be divided into three levels: high, medium, and low. The risk of privacy disclosure was flexibly controlled by privacy protection degree parameter λ. On the basis of this, clustering-based approach for multi-level anonymization was proposed. The approach used a new hierarchical clustering algorithm and adopted more flexible strategies of data generalization for numerical attributes and classified attributes in a quasi-identifier. The experimental results show that the approach can meet the requirement of multi-level anonymous protection of sensitive attribute, and effectively reduce information loss.
Related Articles | Metrics