期刊文献+

入侵检测技术在物联网中的应用研究 被引量:4

Research of Intrusion Detection Technology Applying to Internet of Things
下载PDF
导出
摘要 本文简要介绍了物联网当前在网络安全方面所面临的问题,指出了入侵检测的必要性。对几种入侵检测技术进行了研究论述,对其在物联网架构中的应用做出了分析,对其各自应用效果进行了对比研究,并对下一阶段的研究方向做出了展望。 This article briefly describes the network security issues of the Intemet of Things, and pointed out the necessity of intrusion detection. The current main three-tier structure is proposed in this aritcal and their respective security threats that may exist is analysed.Several intrusion detection technologies's application to the IoT is analysed and their application effects are compared. Finally the direction of thenext stage of the research is given in the article.
作者 张馨 袁玉宇
出处 《软件》 2012年第11期160-164,共5页 Software
关键词 物联网 网络安全 入侵检测 多代理 遗传算法 Internet of Things Network security intrusion detection multiple proxies genetic algorithm
  • 相关文献

参考文献11

二级参考文献39

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2刘洪杰,王秀峰.多峰搜索的自适应遗传算法[J].控制理论与应用,2004,21(2):302-304. 被引量:23
  • 3[1]J M Bradshaw(ED.).An Intruduction to Software Agents[M].AAA1 Press/MIT Press, Cambridge, MA, 1997.3-46.
  • 4[2]Eugene H Spafford, Diego Zamboni. Intrusion Detection Using Autonomous Agents [ J ]. Computer Networks, 2000, 34 (4): 547-570.
  • 5[3]Major Dennis J Ingram, H Steven Kremer, Neil C Rowe. Distributed Intrusion Detection for Computer Systems Using Communicating Agents [ EB/OL]. http://www. dodccrp. org/2000CCRTS/cd/html/pdf_ papers/Track _ 7/010. pdf 2002-11-20.
  • 6[4]Wayne Jansen, Peter Mell,et al. Applying Mobile Agents to Intrusion Detection and Response [ EB/OL]. http://csrc. nist.gov/mobileAgents/publication/maresponse. pdf.
  • 7[5]M Asaka, S Okazawa, A Taguchi, et al. A Method of Tracing Intruders by Use of Mobile Agents[C] . INET' 99 , June 1999.
  • 8[6]Gorodetski V, Kotenko I, Skormin, V. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents'Community. Information Security for Global Information Infrastructures [ C ]. IFIP TC11 Sixteenth Annual Working Conference on Information Security, Qing, S., Eloff J. H. P,Beijing, Chian, 2000.291-300.
  • 9Van Kranenburg R.The Intemet of Things.Amsterdam:Waag Society,2008.
  • 10Yan L,Zhang Y,Yang L T.The Intemet of Things:From RFID to the Next.Generation Pervasive Networked Systems.Auerbach Publications,2008.

共引文献97

同被引文献27

  • 1胡向东,魏琴芳,向敏.物联网安全[M].北京:科学出版社,2012.
  • 2CHANGJUN HAN, YI LV. An intrusion detection system based on neural network[C]. Proc of 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC),2011:2018-2021.
  • 3CAIMING LIU, JIN YANG. Research on immunity-based intru- sion detection technology for the Internet of Things[C]. Proc of 2011 Seventh International Conference on Natural Computation (ICNC), 2011 : 212-216.
  • 4RONGRONG FU, KANGFENG ZHENG. An intrusion detection scheme based on anomaly mining in internet of things[C]. Proc of 4th IET International Conferene-e on Wireless, Moble Multime dia Networks (ICWM-MN 2011), 2011:315- 320.
  • 5REN WULING, CAO JINZHU, WU XIANJ1E. Application of network intrusion detection based on fuzzy c means clustering algo- rithm[J]. 3rd International Symposium on Intelligent Information Technology Application, IITA ,2009(3) : 19-22.
  • 6CHEN BO, MA,WU. Research of intrusion detection based on principal components analysis [C]. Proc of Second International Conference on Information and Computing Science,2009:116-119.
  • 7KDD CUP 1999 data[gB/OL], http://kdd, ics. uci. edu/databas- es/kddc-up99/kddcup99, html.
  • 8YU LEI, LIU HUAN. Feature selection for high-dimensional da ta:a fast correlation-based filter solution E C. Pr-oceedings of the 20th International Conference on Mac-hine Learning. San Francis co: Mogan Kaufmann Publi-shers, 2003:856-863.
  • 9BEZDEK J C. Patten with fuzzy objective function algorithms [M]. New York:Plenum Press,1981.
  • 10温重伟,李荣钧.改进的粒子群优化模糊C均值聚类算法[J].计算机应用研究,2010,27(7):2520-2522. 被引量:24

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部