Analysis of Network Security Data Using Wavelet Transforms
Data Analysis of Network Security is very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data. Fast and accurate retrievals for content-based queries ar...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2014-03-01
|
Series: | Journal of Algorithms & Computational Technology |
Online Access: | https://doi.org/10.1260/1748-3018.8.1.59 |
id |
doaj-54e16703e8f84cd69b39f5b694ecba40 |
---|---|
record_format |
Article |
spelling |
doaj-54e16703e8f84cd69b39f5b694ecba402020-11-25T02:48:37ZengSAGE PublishingJournal of Algorithms & Computational Technology1748-30181748-30262014-03-01810.1260/1748-3018.8.1.59Analysis of Network Security Data Using Wavelet TransformsSun Donghong0Shu Zhibiao1Liu Wu2Ren Ping3Wu Jian-Ping4 Network Research Center of Tsinghua University, Beijing, P.R. China College of Mathematics & Computer Science, Fuzhou University, P.R. China Network Research Center of Tsinghua University, Beijing, P.R. China College of Mathematics Science, Chongqing Normal University, P.R. China Network Research Center of Tsinghua University, Beijing, P.R. ChinaData Analysis of Network Security is very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data. Fast and accurate retrievals for content-based queries are crucial for such numerous data streams to be useful. In this paper, we apply wavelet transforms into network security to analyze and mine time-serial data streams for the detection of anomalous network security events. We first proposes a wavelet based data analysis framework for network security traffic, and signalize the data stream of network security (DSNS), then after de-noise of DSNS, we use wavelet based transforms to analyze the DSNS and get anomalous events for intrusion detection in computer network security. Experimental results show that, by using wavelet transform, we can decrease the noise signal and keep the useful signals of network security data streams to retrieve anomalous events effectively.https://doi.org/10.1260/1748-3018.8.1.59 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sun Donghong Shu Zhibiao Liu Wu Ren Ping Wu Jian-Ping |
spellingShingle |
Sun Donghong Shu Zhibiao Liu Wu Ren Ping Wu Jian-Ping Analysis of Network Security Data Using Wavelet Transforms Journal of Algorithms & Computational Technology |
author_facet |
Sun Donghong Shu Zhibiao Liu Wu Ren Ping Wu Jian-Ping |
author_sort |
Sun Donghong |
title |
Analysis of Network Security Data Using Wavelet Transforms |
title_short |
Analysis of Network Security Data Using Wavelet Transforms |
title_full |
Analysis of Network Security Data Using Wavelet Transforms |
title_fullStr |
Analysis of Network Security Data Using Wavelet Transforms |
title_full_unstemmed |
Analysis of Network Security Data Using Wavelet Transforms |
title_sort |
analysis of network security data using wavelet transforms |
publisher |
SAGE Publishing |
series |
Journal of Algorithms & Computational Technology |
issn |
1748-3018 1748-3026 |
publishDate |
2014-03-01 |
description |
Data Analysis of Network Security is very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data. Fast and accurate retrievals for content-based queries are crucial for such numerous data streams to be useful. In this paper, we apply wavelet transforms into network security to analyze and mine time-serial data streams for the detection of anomalous network security events. We first proposes a wavelet based data analysis framework for network security traffic, and signalize the data stream of network security (DSNS), then after de-noise of DSNS, we use wavelet based transforms to analyze the DSNS and get anomalous events for intrusion detection in computer network security. Experimental results show that, by using wavelet transform, we can decrease the noise signal and keep the useful signals of network security data streams to retrieve anomalous events effectively. |
url |
https://doi.org/10.1260/1748-3018.8.1.59 |
work_keys_str_mv |
AT sundonghong analysisofnetworksecuritydatausingwavelettransforms AT shuzhibiao analysisofnetworksecuritydatausingwavelettransforms AT liuwu analysisofnetworksecuritydatausingwavelettransforms AT renping analysisofnetworksecuritydatausingwavelettransforms AT wujianping analysisofnetworksecuritydatausingwavelettransforms |
_version_ |
1724747529836298240 |