Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((NIU Tong[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Wireless sensor network intrusion detection system based on sequence model
CHENG Xiaohui, NIU Tong, WANG Yanjun
Journal of Computer Applications 2020, 40 (
6
): 1680-1684. DOI:
10.11772/j.issn.1001-9081.2019111948
Abstract
(
361
)
PDF
(656KB)(
374
)
Knowledge map
Save
With the rapid development of Internet of Things (IoT), more and more IoT node devices are deployed, but the accompanying security problem cannot be ignored. Node devices at the network layer of IoT mainly communicate through wireless sensor networks. Compared with the Internet, they are more open and more vulnerable to network attacks such as denial of service. Aiming at the network layer security problem faced by wireless sensor networks, a network intrusion detection system based on sequence model was proposed to detect and alarm the network layer intrusion, which achieved higher recognition rate and lower false positive rate. Besides, aiming at the security problem of the node host device faced by wireless sensor network node devices, with the consideration of the node overhead, a host intrusion detection system based on simple sequence model was proposed. The experimental results show that, the two intrusion detection systems for the network layer and the host layer of wireless sensor network both have the accuracy more than 99%, and the false detection rate about 1%, which meet the industrial requirements. These two proposed systems can comprehensively and effectively protect the wireless sensor network security.
Reference
|
Related Articles
|
Metrics
Select
Design and optimization of network anonymous scanning system
HE Yunhua, NIU Tong, LIU Tianyi, XIAO Ke, LU Xiang
Journal of Computer Applications 2019, 39 (
5
): 1385-1388. DOI:
10.11772/j.issn.1001-9081.2018111960
Abstract
(
573
)
PDF
(677KB)(
386
)
Knowledge map
Save
An anonymous network scanning system was proposed for traceability problem faced by network scanning tools during scanning. Firstly, the anonymous system was combined with the network scanning tool to implement anonymous scanning. Then, the local privatization of the system was implemented based on existing anonymous system. Thirdly, through traffic analysis, it was found that Nmap's multi-process scanning would become a single-process scan due to proxy chain, resulting in lower scan scan performance. Finally, a performance optimization scheme based on multi-Namp process concurrency was proposed, which divided the overall scan task into multiple scan tasks and assigned them to multiple separate Nmap processes in parallel. The experimental results show that the scanning delay of the performance optimization scheme is close to that of the normal scanning system, and achieves the purpose of improving the performance of the anonymous scanning system. Therefore, the optimized network anonymous scanning system hinders the traceability and improves the scanning efficiency.
Reference
|
Related Articles
|
Metrics