期刊文献+

引入合同变换矩阵的网络攻击信号盲分离算法 被引量:1

Blind Separation Algorithm of Network Attack Signal Based on Contract Transformation Matrix
下载PDF
导出
摘要 对网络攻击信号进行盲分离,实现对攻击信号的准确有效检测。传统的网络攻击信号检测算法使用时频分析方法,提取非平稳群攻击信号的时频特征,实现信号检测,但算法把网络入侵检测正确率作为约束目标函数进行同步最优特征子集求解,复杂度较高,提出一种引入合同变换矩阵的网络攻击信号盲分离算法。采用时频分析Viterbi算法,得到信号谱的平均频率等于瞬时频率的时间平均,根据合同变换矩阵,对攻击信号进行离散数据解析化处理,构建网络攻击信号的解析模型,得到网络统计信号在多复变边界条件下的时频特征,实现盲分离算法改进。仿真实验表明,该算法能有效实现对网络攻击信号的盲分离,盲分离结果能准确反映网络攻击信号的内部特征,提高了对网络攻击信号的检测能力,对攻击信号的检测性能有所提高,保证了网络安全。 The blind separation of network attack signal, realize accurate and effective detection of the attack signal. Frequency analysis method using the network attack of traditional signal detection algorithm, extraction of non stationary signal time-frequency feature group attack, the realization of signal detection, but the algorithm to network intrusion detection correct rate as the objective function for synchronization constraints optimal feature subset solution, high complexity, algorithm a separation into the contract transformation matrix of the network attack signals blind is proposed. Using the time-frequency analysis of Viterbi algorithm, the time averaged mean frequency signal spectrum is equal to the instantaneous frequency,according to the contract transformation matrix, the attack on the signal analytical treatment of discrete data, analytical model construction of network attack signal, get the network statistical signal in multi complex time-frequency characteristics of boundary condition, to realize the blind separation algorithm is improved. Simulation results show that the algorithm can effectively realize the blind separation of network attack signals, blind source separation results can accurately reflect the internal characteristics of the network attack signals, improves the ability to detect attacks on the network signal, the detection performance of the improved signal to attack, to ensure network security.
出处 《科技通报》 北大核心 2015年第4期124-126,共3页 Bulletin of Science and Technology
基金 河南省高等学校青年骨干教师资助计划项目(2014GGJS-162)
关键词 网络安全 网络攻击 信号检测 盲分离 network security network attack signal detection blind source separation
  • 相关文献

参考文献5

二级参考文献30

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2罗可,林睦纲,郗东妹.数据挖掘中分类算法综述[J].计算机工程,2005,31(1):3-5. 被引量:62
  • 3汪兴东,佘堃,周明天,刘恒.基于BP神经网络的智能入侵检测系统[J].成都信息工程学院学报,2005,20(1):1-4. 被引量:28
  • 4HanJia-wei,KamberM数据挖掘概念与技术(第2版)[M].范明,孟小峰,译.北京:机械工业出版社,2007:188-200.
  • 5XIAO Ming,XIE ShengLi,FU YuLi.Searching-and-averaging method of underdetermined blind speech signal separation in time domain[J].Science in China(Series F),2007,50(5):771-782. 被引量:6
  • 6Phyu T N. Survey of Classification Techniques in Data Mining [C]//Proeeedings of the International MultiConference of Engi- neers and Computer Scientists. Hong Kong, 2009(1).
  • 7El-shafie A, Muklisin M, Najah Ali A, et al. Performance of arti- ficial neural network and regression techniques for rainfall-run- off prediction[J]. International Journal of the Physical Sciences, 2011,6(8) : 1997-2003.
  • 8Selles M A, Schmid S R, Sanchez-Caballero S, et al. Theoretical Model of a Multi-Layered Polymer Coated Steel-Strip Ironing Process Using a Neural Network[C] //Materials Science Fo- rum. Switzerland, 2012 : 139-144.
  • 9Jiten P, Choi S-K. Classification approach for reliability-based topology optimization using probabilistic neural networks[J]. Structural and Multidiseiplinary Optimization, 2012,45 (4) : 529- 543.
  • 10EI-Emary I M, Ramakrishnan S. On the Application of Various Probabilistic Neural Networks in Solving Different Pattern Clas- sification Problems[J]. World Applied Sciences Journal, 2008, 4 (6) :772-780.

共引文献68

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部