# American Institute of Mathematical Sciences

August & September  2019, 12(4&5): 1371-1384. doi: 10.3934/dcdss.2019094

## An optimization detection algorithm for complex intrusion interference signal in mobile wireless network

 Modern Educational Technology Center, Pingdingshan University, Pingdingshan, China

* Corresponding author: Li Gang

Received  July 2017 Revised  November 2017 Published  November 2018

At present, when detecting intrusive interference signals in classified form, the effect of channel denoising is very poor, and the characteristics of the extracted signals are not clear, which can not achieve effective detection of intrusion signals. An algorithm based on wavelet packet frequency hopping estimation for complex network intrusion detection is proposed in this paper. The soft and hard threshold method is used for wavelet coefficient decomposition, threshold processing, and signal reconstruction; according to probability statistics, a new sequence is composed of the spectral amplitude corresponding to the same frequency of each random variable in a random process and the spectrum matrix of intrusion interference signal is formed, so as to extract the characteristic spectrum of intrusion interference signal; by using the energy balance method, Gauss stochastic wavelet characteristics of intrusion signal can be simulated. The results of network intrusion detection are obtained by the Gauss additivity of the high-order cumulants of the network intrusion. The three edge centroid positioning method is applied to achieve the high-precision location of the intrusion point. Experiments show that the algorithm effectively improves the network channel denoising and the feature extraction effect of the intrusion signal, and it is also better than the current algorithm for the detection and location of the interference signals.

Citation: Li Gang. An optimization detection algorithm for complex intrusion interference signal in mobile wireless network. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1371-1384. doi: 10.3934/dcdss.2019094
##### References:
 [1] M. A. Ambusaidi, X. He, P. Nanda and et al, Building an intrusion detection system using a filter-based feature selection algorithm, IEEE Trans. Comput., 65 (2016), 2986-2998. doi: 10.1109/TC.2016.2519914. [2] M. Andreolini, M. Colajanni and M. Marchetti, A Collaborative Framework for Intrusion Detection in Mobile Networks, Information Sciences, 2015. [3] M. Arthur and K. Kannan, Cross-layer based multiclass intrusion detection system for secure multicast communication of manet in military networks, Wireless Networks, 1035-1059. [4] G. Brinkmann, M. Preissmann and D. Sasaki, Snarks with total chromatic number 5. maloney, g.r. 2015. on substitution tilings of the plane with n-fold rotational symmetry, Discrete Mathematics and Theoretical Computer Science, 17 (2015), 369-382. [5] K. A. P. Costa, L. A. M. Pereira, R. Y. M. Nakamura and C. R. Pereira, A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks, Information Sciences, 294 (2015), 95-108.  doi: 10.1016/j.ins.2014.09.025. [6] Y. H. Q., Network intrusion small signal detection model based on optimization particle swarm algorithm, Bulletin of Science and Technology, 193-195. [7] L. I. Hui-Fang and X. G. Peng, Mobile intelligent terminal intrusion detection method based on cloud computing, Computer Simulation, 380-384. [8] A. Khalili and A. Sami, Sysdetect: A systematic approach to critical state determination for industrial intrusion detection systems using apriori algorithm, Journal of Process Control, 32 (2015), 154-160. [9] D. Kim, The development of 'water strider' inquiry learning program for improving scientific inquiry learning ability in the chapter 'the little creatures world' of the korea elementary school 5th grade science textbook, Eurasia Journal of Mathematics Science and Technology Education, 13 (2007), 3325-3348. [10] Z. Lin and J. R. Wang, New riemann-liouville fractional hermite-hadamard inequalities via two kinds of convex functions, Journal of Interdisciplinary Mathematics, 20 (2017), 357-382. [11] S. Masarat, S. Sharifian and H. Taheri, Modified parallel random forest for intrusion detection systems, Journal of Supercomputing, 2235-2258. [12] A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer and B. D. Payne, Evaluating computer intrusion detection systems: A survey of common practices, Acm Computing Surveys, 48 (2015), 1-41. [13] D. Moon, S. B. Pan and I. Kim, Host-based intrusion detection system for secure human-centric computing, Journal of Supercomputing, 72 (2016), 2520-2536. [14] M. N., D. R. and D. S. K., A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks, IEEE Transactions on Vehicular Technology, 120 (2017), 1684-1695. [15] P. Nader, P. Honeine and P. Beauseroy, Online one-class classification for intrusion detection based on the mahalanobis distance, Journal of Materials Science, 23 (2015), 1260-1264. [16] M. M. Rathore, A. Ahmad and A. Paul, Real time intrusion detection system for ultra-high-speed big data environments, Journal of Supercomputing, 72 (2016), 3489-3510. [17] D. Samfat and R. Molva, Idamn: An intrusion detection architecture for mobile networks, IEEE Journal on Selected Areas in Communications, 15 (1997), 1373-1380. [18] E. Vasilomanolakis, S. Karuppayah and M. Fischer, Taxonomy and survey of collaborative intrusion detection, Acm Computing Surveys, 47 (2015), 1-33. [19] E. Viegas, A. O. Santin, A. Franca, R. Jasinski, V. A. Pedroni and L. S. Oliveira, Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems, IEEE Transactions on Computers, 66 (2017), 163-177.  doi: 10.1109/TC.2016.2560839. [20] B. W., J. A. and P. M., Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 48 (2015), 981-999. [21] P. W., H. Q., M. X. J. and et al, A dynamic network threat assessment method based on multi-source information fusion, Journal of China Academy of Electronics and Information Technology, 17 (2016), 250-256. [22] R. W. W., H. L. and Z. K., Intrusion alert correlation model based on data mining and ontology, Journal of Jilin University (Engineering and Technology Edition), 899-906. [23] X. Zhang and S. L. Yi, Green building evaluation methodology under ecological view, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 79-90. [24] Q. Zhu, C. Fung, R. Boutaba and T. Basar, Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks, IEEE Journal on Selected Areas in Communications, 30 (2012), 2220-2230.

show all references

##### References:
 [1] M. A. Ambusaidi, X. He, P. Nanda and et al, Building an intrusion detection system using a filter-based feature selection algorithm, IEEE Trans. Comput., 65 (2016), 2986-2998. doi: 10.1109/TC.2016.2519914. [2] M. Andreolini, M. Colajanni and M. Marchetti, A Collaborative Framework for Intrusion Detection in Mobile Networks, Information Sciences, 2015. [3] M. Arthur and K. Kannan, Cross-layer based multiclass intrusion detection system for secure multicast communication of manet in military networks, Wireless Networks, 1035-1059. [4] G. Brinkmann, M. Preissmann and D. Sasaki, Snarks with total chromatic number 5. maloney, g.r. 2015. on substitution tilings of the plane with n-fold rotational symmetry, Discrete Mathematics and Theoretical Computer Science, 17 (2015), 369-382. [5] K. A. P. Costa, L. A. M. Pereira, R. Y. M. Nakamura and C. R. Pereira, A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks, Information Sciences, 294 (2015), 95-108.  doi: 10.1016/j.ins.2014.09.025. [6] Y. H. Q., Network intrusion small signal detection model based on optimization particle swarm algorithm, Bulletin of Science and Technology, 193-195. [7] L. I. Hui-Fang and X. G. Peng, Mobile intelligent terminal intrusion detection method based on cloud computing, Computer Simulation, 380-384. [8] A. Khalili and A. Sami, Sysdetect: A systematic approach to critical state determination for industrial intrusion detection systems using apriori algorithm, Journal of Process Control, 32 (2015), 154-160. [9] D. Kim, The development of 'water strider' inquiry learning program for improving scientific inquiry learning ability in the chapter 'the little creatures world' of the korea elementary school 5th grade science textbook, Eurasia Journal of Mathematics Science and Technology Education, 13 (2007), 3325-3348. [10] Z. Lin and J. R. Wang, New riemann-liouville fractional hermite-hadamard inequalities via two kinds of convex functions, Journal of Interdisciplinary Mathematics, 20 (2017), 357-382. [11] S. Masarat, S. Sharifian and H. Taheri, Modified parallel random forest for intrusion detection systems, Journal of Supercomputing, 2235-2258. [12] A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer and B. D. Payne, Evaluating computer intrusion detection systems: A survey of common practices, Acm Computing Surveys, 48 (2015), 1-41. [13] D. Moon, S. B. Pan and I. Kim, Host-based intrusion detection system for secure human-centric computing, Journal of Supercomputing, 72 (2016), 2520-2536. [14] M. N., D. R. and D. S. K., A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks, IEEE Transactions on Vehicular Technology, 120 (2017), 1684-1695. [15] P. Nader, P. Honeine and P. Beauseroy, Online one-class classification for intrusion detection based on the mahalanobis distance, Journal of Materials Science, 23 (2015), 1260-1264. [16] M. M. Rathore, A. Ahmad and A. Paul, Real time intrusion detection system for ultra-high-speed big data environments, Journal of Supercomputing, 72 (2016), 3489-3510. [17] D. Samfat and R. Molva, Idamn: An intrusion detection architecture for mobile networks, IEEE Journal on Selected Areas in Communications, 15 (1997), 1373-1380. [18] E. Vasilomanolakis, S. Karuppayah and M. Fischer, Taxonomy and survey of collaborative intrusion detection, Acm Computing Surveys, 47 (2015), 1-33. [19] E. Viegas, A. O. Santin, A. Franca, R. Jasinski, V. A. Pedroni and L. S. Oliveira, Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems, IEEE Transactions on Computers, 66 (2017), 163-177.  doi: 10.1109/TC.2016.2560839. [20] B. W., J. A. and P. M., Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 48 (2015), 981-999. [21] P. W., H. Q., M. X. J. and et al, A dynamic network threat assessment method based on multi-source information fusion, Journal of China Academy of Electronics and Information Technology, 17 (2016), 250-256. [22] R. W. W., H. L. and Z. K., Intrusion alert correlation model based on data mining and ontology, Journal of Jilin University (Engineering and Technology Edition), 899-906. [23] X. Zhang and S. L. Yi, Green building evaluation methodology under ecological view, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 79-90. [24] Q. Zhu, C. Fung, R. Boutaba and T. Basar, Guidex: A game-theoretic incentive-based mechanism for intrusion detection networks, IEEE Journal on Selected Areas in Communications, 30 (2012), 2220-2230.
hard and soft threshold functions
Improved threshold function
Selection rules of wavelet function and threshold
principle of TDOA distance measurement
Schematic diagram of three point location algorithm for network intrusion interference signal
Experimental model
Comparison of the effect of different algorithms on the denoising of wireless network
Comparison of the effect of different algorithms on the feature extraction of wireless network intrusion signal
Comparison of the effect of different algorithms on the location of intrusion signal
Comparison of the effect of different algorithms on the network intrusion detection
 [1] Keisuke Minami, Takahiro Matsuda, Tetsuya Takine, Taku Noguchi. Asynchronous multiple source network coding for wireless broadcasting. Numerical Algebra, Control and Optimization, 2011, 1 (4) : 577-592. doi: 10.3934/naco.2011.1.577 [2] Jason R. Scott, Stephen Campbell. Auxiliary signal design for failure detection in differential-algebraic equations. Numerical Algebra, Control and Optimization, 2014, 4 (2) : 151-179. doi: 10.3934/naco.2014.4.151 [3] Sebastià Galmés. Markovian characterization of node lifetime in a time-driven wireless sensor network. Numerical Algebra, Control and Optimization, 2011, 1 (4) : 763-780. doi: 10.3934/naco.2011.1.763 [4] Aiwan Fan, Qiming Wang, Joyati Debnath. A high precision data encryption algorithm in wireless network mobile communication. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1327-1340. doi: 10.3934/dcdss.2019091 [5] Yinfei Li, Shuping Chen. Optimal traffic signal control for an $M\times N$ traffic network. Journal of Industrial and Management Optimization, 2008, 4 (4) : 661-672. doi: 10.3934/jimo.2008.4.661 [6] Sangkyu Baek, Bong Dae Choi. Performance analysis of power save mode in IEEE 802.11 infrastructure wireless local area network. Journal of Industrial and Management Optimization, 2009, 5 (3) : 481-492. doi: 10.3934/jimo.2009.5.481 [7] Hong Il Cho, Myungwoo Lee, Ganguk Hwang. A cross-layer relay selection scheme of a wireless network with multiple relays under Rayleigh fading. Journal of Industrial and Management Optimization, 2014, 10 (1) : 1-19. doi: 10.3934/jimo.2014.10.1 [8] Yang Chen, Xiaoguang Xu, Yong Wang. Wireless sensor network energy efficient coverage method based on intelligent optimization algorithm. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 887-900. doi: 10.3934/dcdss.2019059 [9] Birol Yüceoǧlu, ş. ilker Birbil, özgür Gürbüz. Dispersion with connectivity in wireless mesh networks. Journal of Industrial and Management Optimization, 2018, 14 (2) : 759-784. doi: 10.3934/jimo.2017074 [10] Robert Stephen Cantrell, Chris Cosner, Shigui Ruan. Intraspecific interference and consumer-resource dynamics. Discrete and Continuous Dynamical Systems - B, 2004, 4 (3) : 527-546. doi: 10.3934/dcdsb.2004.4.527 [11] Monika Muszkieta. A variational approach to edge detection. Inverse Problems and Imaging, 2016, 10 (2) : 499-517. doi: 10.3934/ipi.2016009 [12] Michael Dellnitz, O. Junge, B Thiere. The numerical detection of connecting orbits. Discrete and Continuous Dynamical Systems - B, 2001, 1 (1) : 125-135. doi: 10.3934/dcdsb.2001.1.125 [13] Christopher Oballe, Alan Cherne, Dave Boothe, Scott Kerick, Piotr J. Franaszczuk, Vasileios Maroulas. Bayesian topological signal processing. Discrete and Continuous Dynamical Systems - S, 2022, 15 (4) : 797-817. doi: 10.3934/dcdss.2021084 [14] Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 [15] Hayato Ushijima-Mwesigwa, MD Zadid Khan, Mashrur A. Chowdhury, Ilya Safro. Optimal Placement of wireless charging lanes in road networks. Journal of Industrial and Management Optimization, 2021, 17 (3) : 1315-1341. doi: 10.3934/jimo.2020023 [16] Ruwu Xiao, Geng Li, Yuping Zhao. On the design of full duplex wireless system with chaotic sequences. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 783-793. doi: 10.3934/dcdss.2019052 [17] Tzu-Hsin Liu, Jau-Chuan Ke, Ching-Chang Kuo. Machine interference problem involving unsuccessful switchover for a group of repairable servers with vacations. Journal of Industrial and Management Optimization, 2021, 17 (3) : 1411-1422. doi: 10.3934/jimo.2020027 [18] G.A.K. van Voorn, D. Stiefs, T. Gross, B. W. Kooi, Ulrike Feudel, S.A.L.M. Kooijman. Stabilization due to predator interference: comparison of different analysis approaches. Mathematical Biosciences & Engineering, 2008, 5 (3) : 567-583. doi: 10.3934/mbe.2008.5.567 [19] Zhong Li, Maoan Han, Fengde Chen. Global stability of a predator-prey system with stage structure and mutual interference. Discrete and Continuous Dynamical Systems - B, 2014, 19 (1) : 173-187. doi: 10.3934/dcdsb.2014.19.173 [20] Eudes. M. Barboza, Olimpio H. Miyagaki, Fábio R. Pereira, Cláudia R. Santana. Radial solutions for a class of Hénon type systems with partial interference with the spectrum. Communications on Pure and Applied Analysis, 2020, 19 (6) : 3159-3187. doi: 10.3934/cpaa.2020137

2020 Impact Factor: 2.425