Skip to main content
Erschienen in: Wireless Personal Communications 1/2022

05.04.2021

Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process

verfasst von: Yafei Wang

Erschienen in: Wireless Personal Communications | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to overcome the problems of low clustering accuracy, low detection efficiency and low detection accuracy in the traditional intrusion detection method for compressed transmission data nodes. This paper proposes an intrusion detection method based on fuzzy analytic hierarchy process. Based on the first-order RF energy consumption model, this method calculates the optimal number of cluster heads, and combines GWO algorithm and FCM algorithm to divide the network into clusters to achieve the clustering of compressed transmission data nodes. On the basis of the characteristics of leaf node attack behavior, the fuzzy consistent judgment matrix is constructed to determine the weight of each security attribute of leaf node, calculate the probability of attack leaf node, and complete the intrusion detection of compressed transmission data node according to the calculation results. The experimental results show that the proposed method has high clustering accuracy, high detection efficiency and high detection accuracy. The shortest detection time is only 2.7 s, and the highest detection accuracy is 98.9%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu, Y., Kang, S. L., & Qiu, H. (2018). A new network intrusion detection algorithm: DA-ROS-ELM. Ieej Transactions on Electrical & Electronic Engineering, 13(4), 602–612.CrossRef Yu, Y., Kang, S. L., & Qiu, H. (2018). A new network intrusion detection algorithm: DA-ROS-ELM. Ieej Transactions on Electrical & Electronic Engineering, 13(4), 602–612.CrossRef
2.
Zurück zum Zitat Zha, Y., & Li, J. (2017). CMA: A reconfigurable complex matching accelerator for wire-speed network intrusion detection. IEEE Computer Architecture Letters, 99, 1–1. Zha, Y., & Li, J. (2017). CMA: A reconfigurable complex matching accelerator for wire-speed network intrusion detection. IEEE Computer Architecture Letters, 99, 1–1.
3.
Zurück zum Zitat Gao, H. (2016). Research on intrusion detection parallel algorithm based on massive logs. Modern Electronics Technique, 39(19), 71–75. Gao, H. (2016). Research on intrusion detection parallel algorithm based on massive logs. Modern Electronics Technique, 39(19), 71–75.
4.
Zurück zum Zitat Qin, Y., Luo, Y. Y., Lu, J. R., et al. (2018). Simulation analysis of resource-based city development based on system dynamics: A Case Study of Panzhihua. Applied Mathematics and Nonlinear Sciences, 3(1), 115–126.CrossRef Qin, Y., Luo, Y. Y., Lu, J. R., et al. (2018). Simulation analysis of resource-based city development based on system dynamics: A Case Study of Panzhihua. Applied Mathematics and Nonlinear Sciences, 3(1), 115–126.CrossRef
5.
Zurück zum Zitat Li, Y., & Li, Y. Z. (2019). Industrial control network intrusion detection algorithm based on self-encoder and extreme learning machine. Journal of Nanjing University of Science and Technology (Natural Science Edition), 43(04), 408–413. Li, Y., & Li, Y. Z. (2019). Industrial control network intrusion detection algorithm based on self-encoder and extreme learning machine. Journal of Nanjing University of Science and Technology (Natural Science Edition), 43(04), 408–413.
6.
Zurück zum Zitat Pan, J. G., & Li, H. (2019). IoT intrusion detection method based on practical byzantine fault tolerance. Computer Application, 39(6), 1742–1746. Pan, J. G., & Li, H. (2019). IoT intrusion detection method based on practical byzantine fault tolerance. Computer Application, 39(6), 1742–1746.
7.
Zurück zum Zitat Liang, C., & Li, H. C. (2016). Novel intrusion detection method based on semi-supervised clustering. Computer Science, 43(5), 87–90. Liang, C., & Li, H. C. (2016). Novel intrusion detection method based on semi-supervised clustering. Computer Science, 43(5), 87–90.
8.
Zurück zum Zitat Ma, W. H., & Hu, P. (2016). Intrusion detection using automatic kernel width optimization RVM based on probabilistic parallel PSO. Application of Electronic Technique, 42(11), 119–121. Ma, W. H., & Hu, P. (2016). Intrusion detection using automatic kernel width optimization RVM based on probabilistic parallel PSO. Application of Electronic Technique, 42(11), 119–121.
9.
Zurück zum Zitat Liu, S. S., & Xie, X. Y. (2016). Research on network intrusion detection based on PCA PSO-BP. Application Research of Computers, 33(9), 2795–2798. Liu, S. S., & Xie, X. Y. (2016). Research on network intrusion detection based on PCA PSO-BP. Application Research of Computers, 33(9), 2795–2798.
10.
Zurück zum Zitat He, Y. (2016). Simulation of intrusion detection model under difference features of hybrid encoding network. Computer Simulation, 33(6), 262–265. He, Y. (2016). Simulation of intrusion detection model under difference features of hybrid encoding network. Computer Simulation, 33(6), 262–265.
11.
Zurück zum Zitat Wu, Y. (2016). Flow analysis network based intrusion model feature correlation technology research. Computer Simulation, 33(4), 352–355. Wu, Y. (2016). Flow analysis network based intrusion model feature correlation technology research. Computer Simulation, 33(4), 352–355.
12.
Zurück zum Zitat Wang, K., & Zhang, J. (2016). Research and implementation of network intrusion detection algorithm based on cloud computing platform. Modern Electronics Technique, 39(19), 76–79. Wang, K., & Zhang, J. (2016). Research and implementation of network intrusion detection algorithm based on cloud computing platform. Modern Electronics Technique, 39(19), 76–79.
13.
Zurück zum Zitat Chen, X. L., Li, Y. Z., & Yu, H. L. (2016). Intrusion detection algorithm based on IPMeans-KELM. Computer Engineering and Applications, 52(22), 118–122. Chen, X. L., Li, Y. Z., & Yu, H. L. (2016). Intrusion detection algorithm based on IPMeans-KELM. Computer Engineering and Applications, 52(22), 118–122.
14.
Zurück zum Zitat Niu, Y. M. (2016). Anomaly detection technology of fiber network traffic a based on fractal theory. Laser Journal, 37(5), 89–92. Niu, Y. M. (2016). Anomaly detection technology of fiber network traffic a based on fractal theory. Laser Journal, 37(5), 89–92.
15.
Zurück zum Zitat Baskonus, H. M., Bulut, H., & Sulaiman, T. A. (2019). New complex hyperbolic structures to the Lonngren-wave equation by using Sine-Gordon expansion method. Applied Mathematics and Nonlinear Sciences, 4(1), 129–138.MathSciNetCrossRef Baskonus, H. M., Bulut, H., & Sulaiman, T. A. (2019). New complex hyperbolic structures to the Lonngren-wave equation by using Sine-Gordon expansion method. Applied Mathematics and Nonlinear Sciences, 4(1), 129–138.MathSciNetCrossRef
16.
Zurück zum Zitat Gao, W., & Wang, W. F. (2017). The fifth geometric-arithmetic index of bridge graph and carbon nanocones. Journal of Difference Equations and Applications, 23(1–-2SI1), 100–109.MathSciNetCrossRefMATH Gao, W., & Wang, W. F. (2017). The fifth geometric-arithmetic index of bridge graph and carbon nanocones. Journal of Difference Equations and Applications, 23(1–-2SI1), 100–109.MathSciNetCrossRefMATH
17.
Zurück zum Zitat Mi, C., Zhang, Z. W., He, X., et al. (2015). Ship identification algorithm based on 3D point cloud for automated ship loaders. Journal of Coastal Research, 73, 28–34.CrossRef Mi, C., Zhang, Z. W., He, X., et al. (2015). Ship identification algorithm based on 3D point cloud for automated ship loaders. Journal of Coastal Research, 73, 28–34.CrossRef
18.
Zurück zum Zitat Altaf, K.M., Atangana, A. 2019. Dynamics of Ebola disease in the framework of different fractional derivatives. Entropy 21(3033). Altaf, K.M., Atangana, A. 2019. Dynamics of Ebola disease in the framework of different fractional derivatives. Entropy 21(3033).
19.
Zurück zum Zitat Cao, B., Zhao, J. W., Lv, Z. H., et al. (2020). Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction. IEEE Transactions on Fuzzy Systems, 28(5), 939–952.CrossRef Cao, B., Zhao, J. W., Lv, Z. H., et al. (2020). Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction. IEEE Transactions on Fuzzy Systems, 28(5), 939–952.CrossRef
20.
Zurück zum Zitat Krishna Kumar, R., Diwakaran, S., & Thilagaraj, M. (2020). Reactive power control of modern type high effective phase grid-tied photovoltaic network inverter. Journal of Green Engineering, 10(9), 4874–4884. Krishna Kumar, R., Diwakaran, S., & Thilagaraj, M. (2020). Reactive power control of modern type high effective phase grid-tied photovoltaic network inverter. Journal of Green Engineering, 10(9), 4874–4884.
22.
Zurück zum Zitat Ramani, U., Nithya, R., Thilagaraj, M., & Sathieshkumar, S. (2020). Genetic algorithm based three input DC source using hybrid power system. Journal of Green Engineering, 10(7), 4227–4243. Ramani, U., Nithya, R., Thilagaraj, M., & Sathieshkumar, S. (2020). Genetic algorithm based three input DC source using hybrid power system. Journal of Green Engineering, 10(7), 4227–4243.
Metadaten
Titel
Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process
verfasst von
Yafei Wang
Publikationsdatum
05.04.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08446-8

Weitere Artikel der Ausgabe 1/2022

Wireless Personal Communications 1/2022 Zur Ausgabe