Using Hilbert-Huang Transform to Characterize Intrusions in Computer Networks

  • Authors:
  • Weihong Wang;Kai Pei;Xiaogang Jin

  • Affiliations:
  • Zhejiang University of Technology, China/ Bejing University of Aeronautics and Astronautics, China;Zhejiang University of Technology, China;Zhejiang University, China

  • Venue:
  • ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 05
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

As there is a rapid rampancy of malicious intrusion, people pay more attentions to the network security. This paper presents a new method based on Hilbert-Huang Transform(HHT) to characterize intrusions that can detect many kinds of intrusion according to the number of packets. This paper demonstrates the usefulness of such a method to differentiate abnormal data from normal data. Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks.