Computer Science ›› 2015, Vol. 42 ›› Issue (3): 224-227.doi: 10.11896/j.issn.1002-137X.2015.03.046

Previous Articles     Next Articles

Mining Algorithm of Frequency Domain Migration Intrusion Feature Based on Information Fusion Transfer

MI Xiao-ping and LI Xue-mei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In the power self incentive networks, the difference property of routing phase group characteristics produces resonance signal,therefore frequency domain migration feature needs to be mined for intrusion signal interception.Traditional methods use shuffled frog leaping algorithm for data mining,and the clustering center vector is close to fuzzy edge,resulting in low search and mining accuracy.An improved mining algorithm of frequency domain migration intrusion feature was proposed based on shuffled frog leaping optimal mode information fusion transfer.The power self combination network system model and mathematical model of intrusion signal are constructed.On the basis of frequency resonant slow fading amplitude equalization principle,the multi-source network attack source signals in the coherent point integrated power accumulation scale coordinate are obtained.The Doppler frequency shift fuzzy search algorithm is used for intrusion signal smoothing processing.The intrusion signal state space modal function of Doppler frequency shift is calculated.Amplitude estimation value is obtained.IIR filtering algorithm is used for signal filtering processing to improve the signal purity.The shuffled frog leaping intrusion detection algorithm based on information fusion of transfer is obtained.Feature mining results are optimized.The frequency domain migration intrusion signal feature mining algorithm is completed.The simulation results show that the algorithm can accurately mine the frequency domain migration feature of intrusion signal.The wave ridge highlight is obvious,and it can improve the detection performance of the intrusion signal in low SNR.

Key words: Shuffled frog leaping algorithm,Frequency domain migration,Data mining,Network

[1] 郑纪彬,符渭波,苏涛,等.一种新的高速多目标检测及参数估计方法[J].西安电子科技大学学报:自然科学版,2013,40(2):82-88
[2] 靳晓艳,周希元,张琬琳.多径衰落信道中基于自适应 MCMC 的调制识别[J].北京邮电大学学报,2014,7(1):31-34
[3] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computer virus under a delayed model[J].Applied Mathematics and Computation,2012,218(23):11613-11619
[4] 邓兵,陶然,平殿发,等.基于分数阶傅里叶变换补偿多普勒徙动的动目标检测算法[J].兵工学报,2009,0(10):1034-1039
[5] 叶青,黄炎磊.非均匀分布入侵检测模型的研究与仿真[J].科技通报,2013,29(8):169-171
[6] 赵鹏军,邵泽军.一种新的改进的混合蛙跳算法[J].计算机工程与应用,2012,48(8):48-50
[7] 张伟,师奕兵,周龙甫,等.基于改进粒子群算法的小波神经网络分类器[J].仪器仪表学报,2010,1(10):2203-2209
[8] 张永铮,肖军,云晓春,等.DDoS 攻击检测和控制[J].软件学报,2012,23(8):2258-2072
[9] 夏秦,王志文,卢柯.入侵检测系统利用信息熵检测网络攻击的方法[J].西安交通大学学报,2013,7(2):14-19
[10] 吴春琼.基于特征选择的网络入侵检测模型[J].计算机仿真,2012,29(6):136-139
[11] 王睿.一种基于回溯的Web上应用层DDOS检测防范机制[J].计算机科学,2013,0(11A):175-177
[12] 李振刚,甘泉.改进蚁群算法优化SVM参数的网络入侵检测模型研究收[J].重庆邮电大学学报:自然科学版,2014,26(6):785-789

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!