Computer Science ›› 2018, Vol. 45 ›› Issue (7): 154-157.doi: 10.11896/j.issn.1002-137X.2018.07.026

• Information Security • Previous Articles     Next Articles

Network Nearest Neighbor Intrusion Detection Algorithm Based on Adaptive Convolution Filtering

LU Qiang1,YOU Rong-yi1,YE Xiao-hong2   

  1. School of Science,Jimei University,Xiamen,Fujian 361021,China1;
    Chengyi University College,Jimei University,Xiamen,Fujian 361021,China2
  • Received:2017-07-21 Online:2018-07-30 Published:2018-07-30

Abstract: The intrusion of the nearest neighbor routing nodes in the deep wireless sensor combination network has the characteristic of fast load variation,and it is difficult to effectively identify the types of attacks and abnormal network behavior.Therefore,this paper proposeda network nearest neighbor instrusion detection algorithm based on convolution filtering.Network traffic is collected in deep wireless sensor combination network,and network intrusion signal model is constructed.Energy density and attack strength of network intrusion signal are analyzed in terms of time and frequency,and blind source filtering and abnormal characteristic extraction of network information are achieved by constructing an adaptive convolution filter.Joint time-frequency analysis method is used to estimate the spectrum parameters of network intrusion feature neighbor information,and intrusion detection of wireless sensor network is done according to the abnormal distribution of spectrum features.Simulation results show that this method has high accuracy for network intrusion detection,has high recognition ability and generalization ability for the unknown network traffic sample sequence,and is superior to HHT detection method and energy management method.

Key words: Adaptive, Convolution filtering, Detection, Intrusion, Network

CLC Number: 

  • TP393.08
[1]LI H,QIAN C J,SUN L Z,et al.Simulation of a flexible polymer tethered to a flat adsorbing surface [J].Journal of Applied Polymer Science,2012,124(1):282-287.
[2]ZHAO X J,SUN Z X,YUAN Y.An Efficient Association Rule Mining Algorithm Based on Prejudging and Screening[J].Journal of Electronics & Information Technology,2016,38(7):1654-1659.(in Chinese)
赵学健,孙知信,袁源.基于预判筛选的高效关联规则挖掘算法[J].电子与信息学报,2016,38(7):1654-1659.
[3]WANG S,ZHAO B F.Network Intrusion Detection Based on Fuzzy Data Mining and Genetic Algorithm[J].Computer Measurement & Control,2012;20(3):660-663.(in Chinese)
王晟,赵壁芳.基于模糊数据挖掘和遗传算法的网络入侵检测技术[J].计算机测量与控制,2012,20(3):660-663.
[4]CECI M,MALERBA D.Classifying Web documents in a hierarchy of categories:a comprehensive study[J].Journal of Intelligent Information System,2007,28(1):37-78.
[5]ZHANG W M,CHEN Q Z.Network Intrusion Detection Algorithm Based on HHT with Shift Hierarchical Control[J].Computer Science,2014,41(12):107-111.(in Chinese)
章武媚,陈庆章.引入偏移量递阶控制的网络入侵HHT检测算法[J].计算机科学,2014,41(12):107-111.
[6]CHEN H,WAN G X,XIAO Z J.Intrusion detection method of deep belief network model based on optimization of data processing[J].Journal of Computer Applications,2017,37(6):1636-1643.(in Chinese)
陈虹,万广雪,肖振久.基于优化数据处理的深度信念网络模型的入侵检测方法[J].计算机应用,2017,37(6):1636-1643.
[7]LI F,WU C M.Research on Prevention Fluctuation Control method of Network Intrusion Based on Energy Management[J].Computer Simulation,2013,30(12):45-48.(in Chinese)
黎峰,吴春明.基于能量管理的网络入侵防波动控制方法研究[J].计算机仿真,2013,30(12):45-48.
[8]DENG Z H,CAO L B,JIANG Y Z,et al.Minimax probability TSK fuzzy system classifier:A more transparent and highly interpretable classification model[J].IEEE Transactions on Fuzzy Systems,2015,23(4):813-826.
[9]HESS R A.Aircraft and rotorcraft system identification-engineering methods with flight test examples[J].Journal of Gui-dance,Control,and Dynamics,2013,36(4):1249-1250.
[10]ZHANG H B,HE Q B,KONG F R.Stochastic resonance in an underdamped system with pinning potential for weak signal detection[J].Sensors,2015,15(9):21169-21195.
[11]WANG H X,WANG S Y,WANG X,et al.Analysis of LFM signals and improvement of IFM system[J].Acta Armamentarii,2014,35(8):1193-1199.(in Chinese)
王洪迅,王士岩,王星,等.瞬时测频系统的线性调频信号分析及改进[J].兵工学报,2014,35(8):1193-1199.
[12]MAHBOUBI H,MOEZZI K,AGHDAM A G,et al.Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors[J].IEEE Transactions on Industrial Informatics,2014,10(1):163-174.
[13]MAHBOUBI H.Distributed deployment algorithms for efficient coverage in a network of mobile sensors with nonidentical sen-sing Capabilities[J].IEEE Transactions on Vehicular Technology,2014,63(8):3998-4016.
[14]DAI W.Application of Intrusion Detection Technology in Network Security.Journal of Chongqing University of Technology(Natural Science),2018,32(4):156-160,185.(in Chinese)
代威.入侵检测技术在网络安全中的应用.重庆理工大学学报(自然科学),2018,32(4):156-160,185.
[1] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[2] HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259.
[3] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[4] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[5] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[6] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[7] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[8] SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69.
[9] HUANG Li, ZHU Yan, LI Chun-ping. Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(9): 76-82.
[10] ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91.
[11] LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100.
[12] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[13] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[14] SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256.
[15] LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!