(3.235.191.87) 您好!臺灣時間:2021/05/14 21:01
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:謝佳奮
研究生(外文):Chia-Fen Hsieh
論文名稱:階層式無線感測網路入侵偵測之研究
論文名稱(外文):A Study on Intrusion Detection for Hierarchical Wireless Sensor Network
指導教授:陳榮靜陳榮靜引用關係
指導教授(外文):Rung-Ching Chen
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:65
中文關鍵詞:攻擊行為防護方式無線感測網路入侵偵測異常偵測
外文關鍵詞:Wireless Sensor NetworksIntrusion DetectionAnomaly DetectionAttack behaviorsCountermeasures
相關次數:
  • 被引用被引用:0
  • 點閱點閱:349
  • 評分評分:
  • 下載下載:24
  • 收藏至我的研究室書目清單書目收藏:0
無線感測網路(Wireless Sensor Network, WSN)是近年來興起的無線網路技術,將感測節點以有限的能源運用在搜集較重要的資訊,如戰場資訊、個人健康資訊等;由於其資訊具有隱私性及重要性,必需防止惡意的攻擊、預防資料竊取及竄改。因此,入侵偵測系統(Intrusion Detection System, IDS)便成為重要的議題之一。在無線感測網路上的入侵偵測系統是利用節點的行為來進行異常偵測,並將該異常節點隔離或排除。基於無線感測網路資源有限的特性,攻擊者的入侵行為模式與有線網路差距較大。因此,入侵偵測方法不同。本研究介紹現有的入侵偵測系統及評估效能方式,並提出利用隔離表,改善無線感測網路入侵偵測無法持續隔離異常節點的方法。實驗結果證明,我們提出的隔離表型入侵偵測可有效的防止入侵。
Wireless Sensor Network (WSN) is a novel technology in wireless field. The main function of this technology is to use sensor nodes to sense important information, just like battlefield data and personal health information, under the limited resources. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. The attack behavior of wireless sensor nodes is different to wired attackers. In this thesis, we will propose an isolation table to detect intrusion in hierarchical wireless sensor networks and the method how to estimate the effect of intrusion detection effectively and. The primary experiment proves the isolation-table intrusion detection can prevent attacks effectively.
Table of Contents
中文摘要 I
Abstract II
致謝 III
Table of Contents V
List of Tables VII
List of Figures VIII
1. Introduction 1
1.1 Background and Motivation 1
1.2 Objective 4
1.3 The Framework of Thesis 5
2. Literature Review 6
2.1 Intrusion Detection System 6
2.1.1 The Intrusion Detection of Wired Networks 7
2.1.2 The Intrusion Detection of Wireless Sensor Networks 8
2.2 Related Technologies 9
2.2.1 The Attack Behaviors 10
2.2.2 Intrusion Detection Types 18
2.2.3 Collaboration-based Intrusion Detection (CID) 20
2.2.4 Routing Tables Intrusion Detection (RTID) 22
3. The Isolation Table Intrusion Detection System (ITIDS) 25
3.1 Predefinition 28
3.2 SCH Monitors MNs 33
3.2.1 The Countermeasure Methods against Different Attack stages 39
3.3 MNs Monitor CH 41
3.4 An Example of ITIDS 44
4. Experiments and Discussions 48
4.1 Estimate IDS Performance 49
4.1.1 The Estimation Method of Wired Networks IDS 49
4.1.2 The Estimation Method of IDS of WSN 52
4.2 The Comparison between CID, RTID and ITIDS 55
4.2.1 Number of Alive Nodes 55
4.2.2 Transmission Accuracy 56
5. Conclusions and Future Works 58
References 60
Publications 65

List of Tables
Table 1 List of DoS Attack Behaviors and Countermeasures 14
Table 2 Denial of Sleep Attack Behaviors 15
Table 3 Compare the Attack Behaviors 17
Table 4 The Information Authentication for Sensor Networks (IASN) 23
Table 5 Related Parameters of ITIDS 27
Table 6 The Persudo Code of Predefinition 29
Table 7 SCH monitor MNs Stage Persudo Code 34
Table 8 The Formula Parameters Table 37
Table 9 MNs Monitor PCH Stage Persudo Code 42
Table 10 The Routing Table of Cluster Head 45
Table 11 Isolation table 46
Table 12 The Compare with Intrusion Detection Systems 47
Table 15 The Implementation Environment 49
Table 13 The Wired Network Intrusion Detection Estimation 50
Table 14 The Parameters of WSN IDS Performance Analysis 53


List of Figures
Figure 1 The Flow Chart of Misuse Detection and Anomaly Detection Application Flow Chart 7
Figure 2 The Secondary Defense of Wireless Sensor Networks 9
Figure 3 The Attack Behaviors 10
Figure 4 The Architecture of CID 21
Figure 5 The Anomaly Detection Table for IASN 22
Figure 6 The DSDV of Node D in Table 4 24
Figure 7 The Flow Chart of Predefine Stage 31
Figure 8 The Flow Chart of Cluster Head monitor Member Nodes 35
Figure 9 The Flow Chart of Member Nodes Monitor Cluster Head 43
Figure 10 The Architecture of Isolation Table Intrusion Detection 45
Figure 11 The Comparison of The Number of Alive Nodes between ITIDS and CID 56
Figure 12 The Comparison of the Transmission Accuracy between ITIDS and RTID 57
References
[1]R. Agarwal and M.V. Joshi, (2001) “PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection),” Proceedings of First SIAM Conference on Data Mining.
[2]N. Ahmed, S. S. Kanhere, and S. Jha, (2005) “The Holes Problem in Wireless Sensor Networks: A Survey,” Mobile Computing and Communications Review, Vol. 9, Issue2, pp. 4-18.
[3]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, (2002) “Wireless sensor networks: a survey,” Computer Networks, Vol.38, Issue4, pp.393-422.
[4]V. Bhuse and A. Gupta, (2006) “Anomaly intrusion detection in wireless sensor networks,” Journal of High Speed Networks, Vol. 15, pp 33-51.
[5]M. Brownfield, G. Yatharth, and N .Davis, (2005) “Wireless Sensor Network Denial of Sleep Attack,” Proceeding of the 6th Annual IEEE SMC, pp. 356-364.
[6]A. Chadha, Y. Liu, and S. K. Das, (2005) “Group Key Distribution via Local Collaboration in Wireless Sensor Networks,” Second IEEE Sensor and Ad Hoc Communications and Networks, pp. 46-54.
[7]C. D. M. Cordeiro and D. P. Agrawal (2006) “Ad Hoc & Sensor Networks - Theory and Applications,” World Scientific.
[8]J. Deng, R. Han, and S. Mishra, (2005) “Defending against Path-based DoS Attacks in Wireless Sensor Networks,” Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 89-96.
[9]W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, (2005) “A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks” , ACM Transactions on Information and System Security (TISSEC), Vol. 8, Issue 2, pp.228–258.
[10]W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, (2002) “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Networking, Vol. 1, Issue. 4, pp. 660-670.
[11]G. Helmer, J.S.K. Wong, V. Honavar, and L. Miller, (2002) “Automated discovery of concise predictive rules for intrusion detection”, Journal of Systems and Software, Vol. 60, Issue 3, pp. 165–175.
[12]H. Karl and A. Willig (2005) “Protocols and Architectures for Wireless Sensor Networks,” C. John Wiley & Sons.
[13]C. Karlof and D. Wagner, (2003) “Secure routing in wireless sensor networks: Attacks and Countermeasures,” Ad Hoc Networks, Vol.1, Issue 2-3, pp. 293-315.
[14]Y. W. Law, J. Doumen, and P. Hartel, (2004) “Survey and Benchmark of Block Ciphers for Wireless Sensor Networks,” Technical Report TR-CTIT-04-07, University of Twente, Computer Science Department.
[15]R. Min and A. Chandrakasan, (2002) “A Framework for Energy-Scalable Communication in High-Density Wireless Networks,” Proceedings of International Symposium on Low Power Electronics and Designs, pp. 36-41.
[16]J. Newsome, E. Shi, D. Song, and A. Perrig, (2004) “The Sybil Attack in Sensor Networks: Analysis and Defenses,” Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268.
[17]I. Onat and A. Miri, (2005) “An Intrusion Detection System for Wireless Sensor Networks,” IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol.11, pp. 253-259.
[18]C. Perkins and P. Bhagwat, (1994) “Highly Dynamic Destination - Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proceedings of the Conference on Communications Architectures, Protocols and Applications, pp.234-244.
[19]W. R. Pires, F. Paula, W. C. Wong, and A. A. F. Loureiro, (2004) “Malicious Node Detection in Wireless Sensor Network,” Proceeding of 18th International Parallel and Distributed Processing Symposium, pp. 24-30.
[20]E. Qing and A. Perrig, (2004) “Designing Secure Sensor Networks,” IEEE Wireless Communication, Vol. 11, Issue 6, pp. 38-43.
[21]L. Qing, Q. Zhu, and M. Wang, (2006) “Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks,” Computer Communications , Vol. 29, Issue 12, pp 2230-2237.
[22]D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, (2006) “Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols,” IEEE Information Assurance Workshop, pp. 297-304.
[23]G. Schafer, (2003) “Security in Fixed and Wireless Networks - An introduction to Securing Data Communications,” John Wiley & Sons.
[24]B. Schneier, (1996) “Applied Cryptography: Protocols, Algorithms and Source Code,” C. John Wiley & Sons, Second edition.
[25]E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, and A. Chandrakasan, (2001) “Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks,” Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 272-287.
[26]T. S. Sobh, (2006) “Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art,” Computer Standards & interfaces, Vol. 28, Issue. 6, pp. 670-694.
[27]M. Strasser and H. Vogt, (2006) “Autonomous and distributed node recovery in wireless sensor networks,”, Proceedings of the 4th ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 113-122.
[28]W. T. Su, K. M. Chang, and Y. H. Kuo, (2007) “eHIP: An Energy-Efficient Hybrid Intrusion Prohibition System for Cluster-based Wireless Sensor Networks,” Computer Networks, Vol. 51, Issue 4, pp. 1151-1168.
[29]S. Tilak, B. Abu-Ghazaleh, and W. Heinzelman, (2002) “A Taxonomy of Wireless Micro-sensor Network Models,” Mobile Computing and Communications Review, Vol. 6, Issue 2, pp. 28-36.
[30]A. D. Wood and J. A. Stankovic, (2002) “Denial of Service in Sensor Networks,” IEEE Computer, Vol.35, Issue 10, pp. 54-62.
[31]陳鴻吉(2004),「利用異質資訊提升入侵警報正確率」,中原大學資訊工程研究所碩士學位論文
[32]曾龍(2005),「Data Source」,成大資通安全研發中心2005網路安全訓練手冊
[33]吳文進(2004),「利用排除的觀念改善入侵偵測特徵比對效能之研究」,華梵大學資訊管理學系碩士學位論文
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊