无线传感器网络攻击检测特征空间的形式化

I. Zikratov, Victoria M. Korzhuk, Ilya Shilov, Alexey Gvozdev
{"title":"无线传感器网络攻击检测特征空间的形式化","authors":"I. Zikratov, Victoria M. Korzhuk, Ilya Shilov, Alexey Gvozdev","doi":"10.23919/FRUCT.2017.8071358","DOIUrl":null,"url":null,"abstract":"The article describes the formalization of the feature space in order to detect abnormal behaviour of nodes in wireless sensor network using statistical methods. The main methods of destructive impact on the infrastructure of wireless sensor networks based on ZigBee Protocol stack are considered. Special attention is paid to attacks on integrity and availability, which theoretically can be detected using the methods of machine learning and mathematical statistics. On the basis of standards and specifications, as well as considered attacks, the space of more than 50 features is developed. Using the methods of Shannon, Kullback and accumulated frequencies, informative value of formalized signs was evaluated. Conclusions about the existing dependencies between the information content of features, the statistics collection period and sample size used to calculate the information content are drawn. Received the results can be used as a basis for further evaluation of the most suitable characteristics for the classification of attacks depending on the network characteristics. In the future the main aim of the study is to build an intrusion detection system that uses statistics of the interactions for a certain period of time as a source of information about the system.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Formalization of the feature space for detection of attacks on wireless sensor networks\",\"authors\":\"I. Zikratov, Victoria M. Korzhuk, Ilya Shilov, Alexey Gvozdev\",\"doi\":\"10.23919/FRUCT.2017.8071358\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article describes the formalization of the feature space in order to detect abnormal behaviour of nodes in wireless sensor network using statistical methods. The main methods of destructive impact on the infrastructure of wireless sensor networks based on ZigBee Protocol stack are considered. Special attention is paid to attacks on integrity and availability, which theoretically can be detected using the methods of machine learning and mathematical statistics. On the basis of standards and specifications, as well as considered attacks, the space of more than 50 features is developed. Using the methods of Shannon, Kullback and accumulated frequencies, informative value of formalized signs was evaluated. Conclusions about the existing dependencies between the information content of features, the statistics collection period and sample size used to calculate the information content are drawn. Received the results can be used as a basis for further evaluation of the most suitable characteristics for the classification of attacks depending on the network characteristics. In the future the main aim of the study is to build an intrusion detection system that uses statistics of the interactions for a certain period of time as a source of information about the system.\",\"PeriodicalId\":114353,\"journal\":{\"name\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT.2017.8071358\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT.2017.8071358","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

为了利用统计方法检测无线传感器网络中节点的异常行为,本文描述了特征空间的形式化。分析了基于ZigBee协议栈的无线传感器网络的主要破坏方式。特别关注对完整性和可用性的攻击,理论上可以使用机器学习和数理统计方法检测。在标准和规范的基础上,以及考虑到的攻击,开发了超过50个功能的空间。利用Shannon法、Kullback法和累积频率法对形式化符号的信息价值进行了评价。得出特征信息含量与统计采集周期、计算信息含量的样本量之间存在的依赖关系的结论。接收到的结果可以作为进一步评估最合适的特征的基础,根据网络特征对攻击进行分类。未来研究的主要目标是建立一个入侵检测系统,该系统使用一定时间内交互的统计数据作为系统的信息来源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Formalization of the feature space for detection of attacks on wireless sensor networks
The article describes the formalization of the feature space in order to detect abnormal behaviour of nodes in wireless sensor network using statistical methods. The main methods of destructive impact on the infrastructure of wireless sensor networks based on ZigBee Protocol stack are considered. Special attention is paid to attacks on integrity and availability, which theoretically can be detected using the methods of machine learning and mathematical statistics. On the basis of standards and specifications, as well as considered attacks, the space of more than 50 features is developed. Using the methods of Shannon, Kullback and accumulated frequencies, informative value of formalized signs was evaluated. Conclusions about the existing dependencies between the information content of features, the statistics collection period and sample size used to calculate the information content are drawn. Received the results can be used as a basis for further evaluation of the most suitable characteristics for the classification of attacks depending on the network characteristics. In the future the main aim of the study is to build an intrusion detection system that uses statistics of the interactions for a certain period of time as a source of information about the system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信