Computer Science ›› 2014, Vol. 41 ›› Issue (12): 107-111.doi: 10.11896/j.issn.1002-137X.2014.12.023

Previous Articles     Next Articles

Network Intrusion Detection Algorithm Based on HHT with Shift Hierarchical Control

ZHANG Wu-mei and CHEN Qing-zhang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In the strong interference background and low signal-to-noise,the accurate detection of network intrusion potential signal is the key of network security.The traditional Hilbert-Huang transform (HHT) intrusion signal detection algorithm has boundary control error resulted from envelope distortion,and spectrum leakage is occurred which leads the bad detection performance .An improved detection algorithm was proposed based on the time-frequency distribution feature and offset hierarchical control network HHT matching.The network potential intrusion mathematical evolution model is constructed,and the complex signals are decomposed into IMF single frequency signal.The intrusion detection system state transfer equation is obtained.The discrete analytical processing of the intrusion signal is taken based on Hilbert transform,and the signal model is obtained.The intrusion signal is decomposed with empirical mode,and the IMF component is analyzed by Hilbert spectrum.The HHT frequency shift is adjusted by hierarchical control mechanism,and residual projection and intrusion signal Hilbert marginal spectrum are matched.The envelope distortion is reduced,and the spectral leakage is suppressed.The accurate detection and parameter estimation of intrusion signal are achieved.Experiments show that this algorithm has strong anti-interference performance in intrusion signal detection,which can detect intrusion signal with low SNR effectively,and the performance of detection is improved.

Key words: Network intrusion,Detection algorithm,Hierarchical control

[1] 孙言强,王晓东,周兴铭.无线网络中的干扰攻击[J].软件学报,2012,23(5):1207-1221
[2] 周华,周海军,马建锋.基于博弈论的入侵容忍系统安全性分析模型[J].电子与信息学报,2013,5(8):1933-1939
[3] 梁力.一种网络多次变异信息入侵检测算法[J].科技通报,2012,10(28):55-57
[4] Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network [J].International Journal of Network Security,2012,14(3):149-155
[5] 樊爱宛,时合生.基于特征选择和SVM参数同步优化的网络入侵检测[J].北京交通大学学报,2013,7(5):58-61
[6] Li Hong,Qian Chang-ji,Sun Li-zhen,et al.Simulation of a flexible polymer tethered to a flat adsorbing surface [J].Journal of Applied Polymer Science,2012,124:282-287
[7] 罗柏文,沈彩耀,于宏毅.采用余弦调制滤波器组的多径衰落信号子带合成[J].信号处理,2013,9(5):537-543
[8] 葛海慧,肖达,陈天平,等.基于动态关联分析的网络安全风险评估方法[J].电子与信息学报,2013,5(11):2630-2636
[9] 张宗飞.基于量子进化算法的网络入侵检测特征选择[J].计算机应用,2013,33(5):1357-1361
[10] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619
[11] 张辉.自体集网络入侵检测中的高效寻优算法仿真[J].计算机仿真,2013,0(8):297-300
[12] 林冬茂,薛德黔.一种基于无监督免疫优化分层的网络入侵检测算法[J].计算机科学,2013,0(3):180-182
[13] 叶竞,石锐,何庆华.基于HHT和改进CSP算法的运动想象BCI系统[J].重庆理工大学学报:自然科学版,2012,26(5):70-73

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!