计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 107-111.doi: 10.11896/j.issn.1002-137X.2014.12.023

• 信息安全 • 上一篇    下一篇

引入偏移量递阶控制的网络入侵HHT检测算法

章武媚,陈庆章   

  1. 浙江工业大学计算机科学与技术学院 杭州310023;浙江工业大学计算机科学与技术学院 杭州310023
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受浙江水利科技项目(RC1226,RC1421),浙江省科技创新团队项目(2012R10022-09)资助

Network Intrusion Detection Algorithm Based on HHT with Shift Hierarchical Control

ZHANG Wu-mei and CHEN Qing-zhang   

  • Online:2018-11-14 Published:2018-11-14

摘要: 在强干扰背景低信噪比下对网络潜质入侵信号的准确检测是决定网络安全的关键。传统的Hilbert-Huang变换(HHT)入侵信号检测算法在求解入侵信号的瞬时频率特征时,因包络线失真引起的边界控制误差,会造成频谱泄漏,从而导致检测性能较差。提出了一种基于时间-频率联合分布特征和偏移量递阶控制HHT匹配的网络入侵信号检测算法,即构建网络潜质入侵数学演化模型,把复杂的入侵信号分解成IMF单频信号,得到入侵检测系统的状态转移方程,基于Hilbert变换对入侵信号进行离散解析化处理,构建入侵信号解析模型。对每个入侵信号经验模态分解后的解析模型IMF分量用 Hilbert变换进行谱分析,通过递阶控制调整HHT频谱偏移,将残差信号投影与入侵信号的Hilbert边际谱进行匹配,减小包络线失真引起的边界控制误差,抑制频谱泄漏,实现对入侵信号的精确检测和参数估计。实验表明,该算法进行网络入侵信号检测时,具有较强的抗干扰性,能从低信噪比背景下有效检测出入侵信号,检测性能有较大提高。

关键词: 网络入侵,检测算法,递阶控制

Abstract: In the strong interference background and low signal-to-noise,the accurate detection of network intrusion potential signal is the key of network security.The traditional Hilbert-Huang transform (HHT) intrusion signal detection algorithm has boundary control error resulted from envelope distortion,and spectrum leakage is occurred which leads the bad detection performance .An improved detection algorithm was proposed based on the time-frequency distribution feature and offset hierarchical control network HHT matching.The network potential intrusion mathematical evolution model is constructed,and the complex signals are decomposed into IMF single frequency signal.The intrusion detection system state transfer equation is obtained.The discrete analytical processing of the intrusion signal is taken based on Hilbert transform,and the signal model is obtained.The intrusion signal is decomposed with empirical mode,and the IMF component is analyzed by Hilbert spectrum.The HHT frequency shift is adjusted by hierarchical control mechanism,and residual projection and intrusion signal Hilbert marginal spectrum are matched.The envelope distortion is reduced,and the spectral leakage is suppressed.The accurate detection and parameter estimation of intrusion signal are achieved.Experiments show that this algorithm has strong anti-interference performance in intrusion signal detection,which can detect intrusion signal with low SNR effectively,and the performance of detection is improved.

Key words: Network intrusion,Detection algorithm,Hierarchical control

[1] 孙言强,王晓东,周兴铭.无线网络中的干扰攻击[J].软件学报,2012,23(5):1207-1221
[2] 周华,周海军,马建锋.基于博弈论的入侵容忍系统安全性分析模型[J].电子与信息学报,2013,5(8):1933-1939
[3] 梁力.一种网络多次变异信息入侵检测算法[J].科技通报,2012,10(28):55-57
[4] Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network [J].International Journal of Network Security,2012,14(3):149-155
[5] 樊爱宛,时合生.基于特征选择和SVM参数同步优化的网络入侵检测[J].北京交通大学学报,2013,7(5):58-61
[6] Li Hong,Qian Chang-ji,Sun Li-zhen,et al.Simulation of a flexible polymer tethered to a flat adsorbing surface [J].Journal of Applied Polymer Science,2012,124:282-287
[7] 罗柏文,沈彩耀,于宏毅.采用余弦调制滤波器组的多径衰落信号子带合成[J].信号处理,2013,9(5):537-543
[8] 葛海慧,肖达,陈天平,等.基于动态关联分析的网络安全风险评估方法[J].电子与信息学报,2013,5(11):2630-2636
[9] 张宗飞.基于量子进化算法的网络入侵检测特征选择[J].计算机应用,2013,33(5):1357-1361
[10] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619
[11] 张辉.自体集网络入侵检测中的高效寻优算法仿真[J].计算机仿真,2013,0(8):297-300
[12] 林冬茂,薛德黔.一种基于无监督免疫优化分层的网络入侵检测算法[J].计算机科学,2013,0(3):180-182
[13] 叶竞,石锐,何庆华.基于HHT和改进CSP算法的运动想象BCI系统[J].重庆理工大学学报:自然科学版,2012,26(5):70-73

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!