location:Home > 2020 Vol.3 Jun. No.3 > Optimized detection algorithm of complex intrusion interference signal in wireless network of medical equipment

2020 Vol.3 Jun. No.3

  • Title: Optimized detection algorithm of complex intrusion interference signal in wireless network of medical equipment
  • Name: Yun-sheng Chen
  • Company: Modern Educational Technology Center,Pingdingshan University
  • Abstract:

    At present, when detecting intrusive interference signals in classified form, the effect of channel denoising is very poor, and the characteristics of the extracted signals are not clear, which can not achieve effective detection of intrusion signals. An algorithm based on wavelet packet frequency hopping estimation for complex network intrusion detection is proposed in this paper. The soft and hard threshold method is used for wavelet coefficient decomposition, threshold processing, and signal reconstruction; according to probability statistics, a new sequence is composed of the spectral amplitude corresponding to the same frequency of each random variable in a random process and the spectrum matrix of intrusion interference signal is formed, so as to extract the characteristic spectrum of intrusion interference signal; by using the energy balance method, Gauss stochastic wavelet characteristics of intrusion signal can be simulated. The results of network intrusion detection are obtained by the Gauss additivity of the high-order cumulants of the network intrusion. The three edge centroid positioning method is applied to achieve the high-precision location of the intrusion point. Experiments show that the algorithm effectively improves the network channel denoising and the feature extraction effect of the intrusion signal, and it is also better than the current algorithm for the detection and location of the interference signals.

  • Keyword: wireless network; intrusion interference signal; detection
  • DOI: 10.12250/jpciams2020030113
  • Citation form: Yun-sheng Chen.Optimized detection algorithm of complex intrusion interference signal in wireless network of medical equipment[J]. Computer Informatization and Mechanical System, 2020, vol. 3, pp. 40-49.
Reference:

[1]D. Samfat and R. Molva, IDAMN: an intrusion detection architecture for mobile networks, IEEE Journal on Selected Areas in Communications, 7(2015),1373-1380.
[2]E. Vasilomanolakis, S. Karuppayah and M. Fischer, Taxonomy and Survey of Collaborative Intrusion Detection, Acm Computing Surveys, 4(2015),1-33.
[3]M.A.Ambusaidi, X. He, P. Nanda, et al, Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm, IEEE Transactions on Computers, 10(2016),2986-2998.
[4]Q. Zhu, C. Fung, R. Boutaba, et al, GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks, IEEE Journal on Selected Areas in Communications, 11(2015),2220-2230.
[5]A. Milenkoski, M. Vieira, S. Kounev, et al, Evaluating Computer Intrusion Detection Systems:A Survey of Common Practices, Acm Computing Surveys, 1(2015),1-41.
[6]W. Bul'Ajoul, A. James and M. Pannu, Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 6(2015),981-999.
[7]A. Khalili and A. Sami, SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm, Journal of Process Control, 11(2015),154-160.
[8]K.A.P.Costa, L.A.M. Pereira, R.Y.M.Nakamura, et al, A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks, Information Sciences, C(2015),95-108.
[9]M.M.Rathore, A.Ahmad and A.Paul, Real time intrusion detection system for ultra-high-speed big data environments, Journal of Supercomputing, 9(2016),3489-3510.
[10]M.Andreolini, M.Colajanni and M.Marchetti, A collaborative framework for intrusion detection in mobile networks, Information Sciences, C(2015),179-192.
[11]N.Marchang, R.Datta and S.K.Das, A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, 2(2017),1684-1695.
[12]P.Nader, P.Honeine and P.Beauseroy, Online One-class Classification for Intrusion Detection Based on the Mahalanobis Distance, Journal of Materials Science, 4(2015),1260-1264.
[13]E.Viegas, A.O.Santin, A.França, et al, Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems, IEEE Transactions on Computers, 1(2017),163-177.
[14]M.P.Arthur and K.Kannan, Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks, Wireless Networks, 3(2016),1035-1059.
[15]D.Moon, S.B.Pan and I.Kim, Host-based intrusion detection system for secure human-centric computing, Journal of Supercomputing, 7(2016),2520-2536.
[16]W.Peng, Q.Huang, X.J.Meng, et al, A Dynamic Network Threat Assessment Method Based on Multi-Source Information Fusion, Journal of China Academy of Electronics and Information Technology, 3(2016),250-256.
[17]H.F.Li and X.G.Peng, Mobile Intelligent Terminal Intrusion Detection Method Based on Cloud Computing, Computer Simulation, 3(2016),380-384.
[18]H.Q.Yan, Network Intrusion Small Signal Detection Model Based on Optimization Particle Swarm Algorithm, Bulletin of Science and Technology, 12(2015),193-195.
[19]W.W.Ren, L.Hu and K.Zhao, Intrusion alert correlation model based on data mining and ontology, Journal of Jilin University(Engineering and Technology Edition), 3(2015),899-906.
[20]S.Masarat, S.Sharifian and H.Taheri, Modified parallel random forest for intrusion detection systems, Journal of Supercomputing, 6(2016), 2235-2258.

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16