Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach
In the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2015-10-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2015/387462 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850221202025480192 |
|---|---|
| author | Bokyoung Kang Dongsoo Kim Minsoo Kim |
| author_facet | Bokyoung Kang Dongsoo Kim Minsoo Kim |
| author_sort | Bokyoung Kang |
| collection | DOAJ |
| description | In the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due to its inherent characteristics. For the sound operation of WSN, it is important to block malicious connections from the network as early as possible. This paper proposes a novel approach to real-time monitoring of network by using the sequential K NN voting. When connection data is sequentially recorded on the log, the final result of ongoing behavior is predicted probabilistically with only partial data, which iterates consecutively as additional connection data are accumulated to the log. Once this predicted probability reaches certain preset threshold value for possible network intrusion, then we can do some preventive actions for this ongoing connection. The value of this research lies in that the eventualities are predicted at the early stage of connection with partial information available. Since the prediction uses sequential K NN voting, the accuracy of our approach can be even more enhanced as with the volume of log grows. |
| format | Article |
| id | doaj-art-7081399a97484794bf130e7d077dcf89 |
| institution | OA Journals |
| issn | 1550-1477 |
| language | English |
| publishDate | 2015-10-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-7081399a97484794bf130e7d077dcf892025-08-20T02:06:47ZengWileyInternational Journal of Distributed Sensor Networks1550-14772015-10-011110.1155/2015/387462387462Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting ApproachBokyoung Kang0Dongsoo Kim1Minsoo Kim2 Department of Industrial Engineering, Seoul National University, 599 Gwanangno, Gwanak-Gu, Seoul 08826, Republic of Korea Department of Industrial and Information Systems Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 06978, Republic of Korea Division of Systems Management and Engineering, Pukyong National University, Daeyeon Campus, 45 Yongso-ro, Nam-Gu, Busan 48513, Republic of KoreaIn the ubiquitous network environment where numerous devices are connecting each other, it is believed that security will play an important role in overall network management. And the wireless sensor network (WSN) is commonly considered to be one of such networks prone to a wide range of attacks due to its inherent characteristics. For the sound operation of WSN, it is important to block malicious connections from the network as early as possible. This paper proposes a novel approach to real-time monitoring of network by using the sequential K NN voting. When connection data is sequentially recorded on the log, the final result of ongoing behavior is predicted probabilistically with only partial data, which iterates consecutively as additional connection data are accumulated to the log. Once this predicted probability reaches certain preset threshold value for possible network intrusion, then we can do some preventive actions for this ongoing connection. The value of this research lies in that the eventualities are predicted at the early stage of connection with partial information available. Since the prediction uses sequential K NN voting, the accuracy of our approach can be even more enhanced as with the volume of log grows.https://doi.org/10.1155/2015/387462 |
| spellingShingle | Bokyoung Kang Dongsoo Kim Minsoo Kim Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach International Journal of Distributed Sensor Networks |
| title | Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach |
| title_full | Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach |
| title_fullStr | Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach |
| title_full_unstemmed | Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach |
| title_short | Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential NN Voting Approach |
| title_sort | real time connection monitoring of ubiquitous networks for intrusion prediction a sequential nn voting approach |
| url | https://doi.org/10.1155/2015/387462 |
| work_keys_str_mv | AT bokyoungkang realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach AT dongsookim realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach AT minsookim realtimeconnectionmonitoringofubiquitousnetworksforintrusionpredictionasequentialnnvotingapproach |