期刊文献+

恶意干扰网络病毒的盲频谱检测算法 被引量:4

Blind Spectrum Detection Algorithm for Malicious Interference Network Virus
下载PDF
导出
摘要 恶意干扰下的网络病毒信息具有较强的高斯随机性和带宽性,传统的时频分析方法及小波特征检测方法难以实现对该类病毒入侵的有效检测。提出一种基于盲频谱检测的恶意干扰下网络病毒检测算法。构建了恶意干扰下的网络病毒入侵的信号模型构建,采用高斯平滑滤波算法进行干扰抑制预处理,提取滤波后的恶意干扰下病毒数据的盲频谱特征,以此为数据基础实现对网络入侵的准确检测。仿真结果表明,采用该文算法进行网络病毒检测识别准确度较高,性能优越,保障了网络安全。 The information of the network virus with malicious interference has strong Gauss random and bandwidth, the traditional time-frequency analysis method and wavelet feature detection method is difficult to achieve the effective detection of the virus intrusion. A new detection algorithm of network virus based on blind spectrum detection is proposed. The signal model of network virus intrusion is constructed, and the interference suppression is used to extract the data from the filtered malicious interference. The method is used to realize the accurate detection of network intrusion. The simulation results show that the proposed algorithm has higher accuracy and better performance, which ensures the security of the network.
作者 石慧 李冰
出处 《科技通报》 北大核心 2016年第4期134-138,共5页 Bulletin of Science and Technology
基金 河南省自然科学基金研究项目资助(152300410145)
关键词 网络病毒 盲频谱 信号 检测 network virus blind spectrum signal detection
  • 相关文献

参考文献8

二级参考文献78

  • 1周毅,顾进广,刘斌.设计模式在IT资源管理系统中的应用[J].微计算机信息,2008,24(3):245-246. 被引量:2
  • 2朱强,王慧强,吕宏武,王振东.VNE-AFS:基于人工鱼群的网络虚拟化映射算法[J].通信学报,2012,33(S1):170-177. 被引量:9
  • 3何泓伟,曲朝阳.设计模式混合的构造方法研究及应用[J].计算机工程与设计,2007,28(5):999-1001. 被引量:5
  • 4Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: A survey[J]. Computer Networks, 2002, 38(4): 393-422.
  • 5Mejia M, Pefia N, Mufioz J L, et al. A game theoretic trust model for on-line distributed evolution of cooperation in MANETs[J]. J of Network and Computer Applications, 2011, 34(1): 39-51.
  • 6. Komathy K, Narayanasamy E Best neighbor strategy to enforce cooperation among selfish nodes in wireless Ad Hoc network[J]. Computer Communications, 2007, 30(18): 3721-3735.
  • 7Niyato D, Hossain E. Dynamics of network selection in heterogeneous wireless networks: An evolutionary game approach[J]. IEEE Trans on Vehicular Technology, 2009, 58(4): 2008-2017.
  • 8Crosby G V, Pissinou N. Evolution of cooperation in multi- class wireless sensor networks[C]. Proc of 32nd IEEE Conf on Local Computer Networks. Los Alamitos: IEEE Press, 2007: 489-495.
  • 9Tembine H, Altman E, E1-Azouzi R, et al. Evolutionary games in wireless networks[J]. IEEE Trans on Systems, Man and Cybernetics, 2010, 40(3): 634-646.
  • 10Wang Y F, Nakao A, Vasilakos A V, et al. P2P soft security: On evolutionary dynamics of P2P incentive mechanism[J]. Computer Communications, 2011, 34(3): 241-249.

共引文献50

同被引文献40

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部