Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach

In the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due...

Full description

Saved in:
Bibliographic Details
Main Authors: Bokyoung Kang, Dongsoo Kim, Minsoo Kim
Format: Article
Language:English
Published: Wiley 2015-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/387462
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850221202025480192
author Bokyoung Kang
Dongsoo Kim
Minsoo Kim
author_facet Bokyoung Kang
Dongsoo Kim
Minsoo Kim
author_sort Bokyoung Kang
collection DOAJ
description In the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due to its inherent characteristics. For the sound operation of WSN, it is important to block malicious connections from the network as early as possible. This paper proposes a novel approach to real-time monitoring of network by using the sequential K NN voting. When connection data is sequentially recorded on the log, the final result of ongoing behavior is predicted probabilistically with only partial data, which iterates consecutively as additional connection data are accumulated to the log. Once this predicted probability reaches certain preset threshold value for possible network intrusion, then we can do some preventive actions for this ongoing connection. The value of this research lies in that the eventualities are predicted at the early stage of connection with partial information available. Since the prediction uses sequential K NN voting, the accuracy of our approach can be even more enhanced as with the volume of log grows.
format Article
id doaj-art-7081399a97484794bf130e7d077dcf89
institution OA Journals
issn 1550-1477
language English
publishDate 2015-10-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-7081399a97484794bf130e7d077dcf892025-08-20T02:06:47ZengWileyInternational Journal of Distributed Sensor Networks1550-14772015-10-011110.1155/2015/387462387462Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting ApproachBokyoung Kang0Dongsoo Kim1Minsoo Kim2 Department of Industrial Engineering, Seoul National University, 599 Gwanangno, Gwanak-Gu, Seoul 08826, Republic of Korea Department of Industrial and Information Systems Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 06978, Republic of Korea Division of Systems Management and Engineering, Pukyong National University, Daeyeon Campus, 45 Yongso-ro, Nam-Gu, Busan 48513, Republic of KoreaIn the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due to its inherent characteristics. For the sound operation of WSN, it is important to block malicious connections from the network as early as possible. This paper proposes a novel approach to real-time monitoring of network by using the sequential K NN voting. When connection data is sequentially recorded on the log, the final result of ongoing behavior is predicted probabilistically with only partial data, which iterates consecutively as additional connection data are accumulated to the log. Once this predicted probability reaches certain preset threshold value for possible network intrusion, then we can do some preventive actions for this ongoing connection. The value of this research lies in that the eventualities are predicted at the early stage of connection with partial information available. Since the prediction uses sequential K NN voting, the accuracy of our approach can be even more enhanced as with the volume of log grows.https://doi.org/10.1155/2015/387462
spellingShingle Bokyoung Kang
Dongsoo Kim
Minsoo Kim
Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
International Journal of Distributed Sensor Networks
title Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
title_full Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
title_fullStr Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
title_full_unstemmed Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
title_short Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
title_sort real time connection monitoring of ubiquitous networks for intrusion prediction a sequential nn voting approach
url https://doi.org/10.1155/2015/387462
work_keys_str_mv AT bokyoungkang realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach
AT dongsookim realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach
AT minsookim realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach