CN101217378A - A wavelet analysis boundary processing method based on traffic statistics - Google Patents

A wavelet analysis boundary processing method based on traffic statistics Download PDF

Info

Publication number
CN101217378A
CN101217378A CNA2008100192792A CN200810019279A CN101217378A CN 101217378 A CN101217378 A CN 101217378A CN A2008100192792 A CNA2008100192792 A CN A2008100192792A CN 200810019279 A CN200810019279 A CN 200810019279A CN 101217378 A CN101217378 A CN 101217378A
Authority
CN
China
Prior art keywords
signal
average
length
sum
wavelet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100192792A
Other languages
Chinese (zh)
Other versions
CN101217378B (en
Inventor
王汝传
蒋凌云
任勋益
张登银
祝世雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2008100192792A priority Critical patent/CN101217378B/en
Publication of CN101217378A publication Critical patent/CN101217378A/en
Application granted granted Critical
Publication of CN101217378B publication Critical patent/CN101217378B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a processing method for wavelet analysis boundary based on the flow statistic and relates to a method used for solving of Hurst parameters based on the wavelet analysis and the invention is mainly used for solving the problem of exact solving of the Hurst parameters so as to detect the DDoS attack exactly. In the method, the Mallat algorithm is applied to carry out discrete wavelet decomposition, and flow statistic is done to signals of every grade in the process of multistage decomposition and the average flow is used as the extension signals; the signals waiting to be detected after the pretreatment are set to be S is equal to (S1, S2,..., Sn), and the signal length is n, and the S1, S2, ..., Sn are the statistic flows in the same specified time interval, and the length of a wavelet filter is Wlen, and the maximum decomposable level is that MaxLev is equal to (log 2 (n/Wlen-1) rounding in the lower). By using the method provided by the invention, the Hurst parameters can be calculated more exactly and the DDoS attack can be judged accurately in the DDoS attack based on the self-similarity theory.

Description

A kind of wavelet analysis boundary processing method based on traffic statistics
Technical field
The present invention utilizes wavelet analysis to find the solution a kind of boundary processing method based on traffic statistics in Hurst (self similar parameter) parametric procedure.Be mainly used in BORDER PROCESSING based on signal in the Hurst parametric solution process of wavelet analysis, judge whether to take place DDoS (Distributed Denial of Service according to the Hurst parameter value then, distributed denial of service) attacks, belong to the network security technology field.
Background technology
Along with network becomes people's life and work necessary part, network security also just more and more becomes the network application key point.From that day that network is popularized, the network crime did not just stop, and the trend that grows in intensity is arranged on the contrary.The research of ddos attack is become the focus and the field, forward position of current domestic and international network security research, caused the very big concern of national governments, scientific research department and industry.Server is taken precautions against ddos attack and mainly contained two aspects at present: ddos attack detects with ddos attack and filters.Detection is the prerequisite of filtering, so the efficient that ddos attack detects is to take precautions against the key of attacking.Ddos attack detects the method for the main extraction packet off-note that adopts and based on the statistics detection technique its defective is arranged all at present, along with the maturation of network traffics self similarity model theory, people propose Network Based from the ddos attack detection means of acquaintance like model.
At the beginning of the nineties, Leland proposes real network traffics to Bellcore (Bell Laboratory) and has self-similarity on the statistical significance.After this, many researchers measure other network again, as Paxson WAN (wide area network) network is measured, wherein comprise many TCP (transmission control protocol) arrival process; Crovella etc. have observed WWW (World Wide Web (WWW)) business, show that all the real network Business Stream all having correlation in the scope for a long time, promptly is a long correlation.Therefore, the current network business is more suitable for adopting the model with long-range dependence, describes as the self similar processes model.The self-similarity of Model of network traffic is because the heavy-tailed distribution character of file causes, and when ddos attack takes place, attacks the transmission of packet with normal tcp data bag in the blocking network.At this moment, the self similarity performance of network can reduce.When attack made that network almost completely blocks, the packet in the network all was the packet of ddos attack basically.At this moment, network traffics will trend towards the Poisson distribution process, and promptly Hurst trends towards 0.5.That is to say that when ddos attack takes place, the Hurst parameter will have comparatively obvious variation.From the variation of Hurst value, whether we just can detect ddos attack has taken place.
Shown in the ddos attack detection model of flow self-similarity Network Based that flow self similarity model Network Based detects the process of ddos attack.At first the feature of packet is extracted, be sent to then in the feature database, judge whether to have taken place ddos attack after utilizing the information Hurst value be stored in the feature database to ask for by packet capture.Its key content is found the solution the Hurst parameter exactly, so the speed of the accuracy of Hurst parametric solution and degree has determined accuracy and efficient that ddos attack detects.Extraction for the Hurst coefficient, forefathers have provided a lot of methods, as R/S (the scale weighted error is analyzed again) method, variance-time method etc., but the appearance of small echo has brought new method for this problem, this is to carry out on yardstick and time-domain because be when utilizing small echo to signal analysis, especially it has getting in touch of nature in the yardstick consistency of multiple dimensioned characteristic and self similar processes, so in the signature analysis to self similar processes, small echo becomes inevitable choice.
The fast wavelet transform algorithm (being called the Mallat algorithm) that Mallat proposes has been realized the conversion of wavelet analysis from mathematics to the technology, has established the status of wavelet analysis as quick computational tool.In actual application, the process of wavelet decomposition is to calculate the convolution of input signal and analysis filter earlier, then convolution results is carried out the dot interlace sampling, to form the high and low frequency signal.In the multiple dimensioned decomposition of Mallat algorithm signal, primary signal S obtains detail signal d after by high pass filter Hi_D down-sampling, by obtaining approximate signal a behind the low pass filter Lo_D down-sampling, constantly pairing approximation signal a decomposes and obtains multiple dimensioned detail coefficients d J, k(suppose that the wavelet filter length that is adopted is WLen, but its maximum decomposed class then
Figure S2008100192792D00021
Figure S2008100192792D00022
J is a decomposed class, j ∈ [1, MaxLev], k is for decomposing the signal length that decomposites in the progression at each grade):
d j , k = < x ( t ) , &psi; j , k ( t ) > = 2 - j / 2 &Integral; x ( t ) &psi; ( 2 - j t - k ) dt
Figure S2008100192792D00024
= 2 j ( H + 1 / 2 ) d 0 , k
Wherein, Ψ J, k (t)Be that wavelet function Ψ (t) is expanded and translation, &psi; j , k ( t ) = 2 - j 2 &psi; ( 2 - j t - k ) dt Be two to advance orthogonal wavelet, its regularity index is R.D so J, kVariance be
Var[d j,k]=Var[2 j(H+1/2)d 0,k]
=2 j(2H+1)Var[d 0,k]
=C2 j(2H+1)
=C2 (1)
After the data on (1) formula both sides were taken the logarithm, carrying out under the meaning of mean square error minimum that linear fit obtains with j was independent variable, with log 2 Var[dj, k]Be the straight line of function, slope is γ.Utilize γ=2H+1 just can try to achieve the value of H.
Sum up, it is as follows that small echo is found the solution the algorithm flow concrete grammar of Hurst index:
(1) primary signal initialization.
(2), obtain and preserve the multiple dimensioned detail coefficients d of corresponding each yardstick to signal S with small echo high pass, low pass filter carry out convolution and the down-sampling branch is clipped to detail signal d and approximate signal a J, k
(3) judge whether it is afterbody, if then carried out for (4) step, otherwise carried out for (2) step.
(4) under the meaning of mean square error minimum, carry out the linear fit parameter Estimation.
(5) calculate the Hurst parameter.
Using Mallat algorithm wavelet decomposition concerning the endless signal, when finite digital signal is made wavelet transformation, owing to do not know the exact value of signal back, so must expand original signal in some way.BORDER PROCESSING mode commonly used at present has zero continuation, periodic extension, symmetric extension etc., and establishing primary signal length is NLen, filter length WLen, and the signal length that need carry out convolution is NLen+Wlen-1.
For zero continuation, the border zero padding of original signal.
Periodic extension: original signal is regarded as periodic signal.
Symmetric extension: original signal is carried out the mirror reflection continuation at the end points place.The difference of setting according to reflected ray has two kinds of methods, and the one, reflected ray passes end points, and the 2nd, reflected ray is in the centre of two points.The continuation method of left end point among first method such as the figure, second method is shown in the continuation method of right endpoint.Which kind of method no matter, its signal all is to be symmetry shape to distribute.
Which kind of method all can not the real signal message of right-on reaction, so also just can accurately not solve the Hurst parameter, has influenced the accuracy that ddos attack detects.
Summary of the invention
Technical problem: the purpose of this invention is to provide a kind of wavelet analysis boundary processing method, solve the Hurst parameter and accurately find the solution problem, accurately detect ddos attack thereby solve based on traffic statistics.The method that the application of the invention proposes detecting in the ddos attack based on Self-similarity Theory, can solve the Hurst parameter more accurately, judges whether to take place ddos attack exactly.
Technical scheme: method of the present invention is on the basis of flow self-similarity principle Network Based, utilizes traffic statistics to carry out BORDER PROCESSING, improves a kind of method of Hurst parametric solution precision, makes the ddos attack detection accuracy higher.
Packet capture and extraction module carry out quick feature extraction to the packet after catching, and the traffic characteristic in the packet is extracted, and store the input information that goes in the feature database with as the Hurst parametric solution into.The data packet flow characteristic information that the data packet flow characteristic extracting module is responsible for catching stores in the feature database, and attack detectors reading flow measure feature information from feature database is carried out check and analysis.The feature database between plays the function of buffer-stored.From the position of feature database system of living in, what it was mainly finished is to approach database function, but because the real-time that detects, and the data of this database storage will be fully in internal memory, rather than form storage file.Because the real-time requirement that detects, characteristic value was stored in the feature database after a period of time, concerning detector, belonged to historical data, there are not much purposes, therefore, feature database itself should have automatic refresh function, finish to historical data refresh removal automatically, be unlikely to undue increase with the scale that keeps feature database.In the overall framework of feature database, the traffic characteristic PktHdr that left side characteristic extracting module extracts is delivered in the feature database and preserves.The inner chain sheet form that adopts of feature database.The right attack detectors is extracted the characteristic value sequence of certain-length from feature database, attack detectors has certain call format to data computing, therefore must just can import initial data into detector through processing and use for analyzing.The input data of detector exactly with initial data according to uniformly-spaced dividing the time of advent, each time interval is as a time slot, add up received length of data package summation in this time slot, with received length of data package summation in this time slot of statistics as signal values to be detected such as this time slots.Carry out the attack detecting analytical calculation through carrying out the Hurst parametric solution after the preliminary treatment.
In this method, (the fast wavelet transform algorithm that Mallat proposes has been realized the conversion of wavelet analysis from mathematics to the technology to use the Mallat algorithm.In actual application, the process of wavelet decomposition is to calculate the convolution of input signal and analysis filter earlier, then convolution results is carried out the dot interlace sampling, to form the high and low frequency signal.Use Mallat algorithm wavelet decomposition concerning the endless signal, when finite digital signal is made wavelet transformation, owing to do not know the exact value of signal back, so must expand original signal in some way), carrying out discrete wavelet decomposes, in multistage decomposable process, each grade signal is carried out traffic statistics, utilize its average discharge, establish through preliminary treatment and wait for that detection signal is S=[S1 as the continuation signal, S2, ... Sn], wherein signal length is n, S1, S2, ..., Sn is the flow that identical appointed interval came out in the time, wavelet filter length is WLen, but its maximum decomposed class then
Figure S2008100192792D00051
Figure S2008100192792D00052
Specifically comprise the steps:
1). the statistics [S1, S2 ... Sn] total flow, computational methods are as follows:
Sum=S1+S2+...+Sn; Sum is a total flow;
2). calculate average discharge, computational methods are as follows:
Average=sum/n; Average is an average discharge:
3). signal S is carried out boundary extension, and method is as follows;
[S1, S2 ... Sn, average, average ... average], use average discharge average to carry out boundary extension, signal length is n+WLen after the continuation;
4). to signal S with small echo high pass, low pass filter carry out convolution and the down-sampling branch is clipped to detail signal d and approximate signal a;
5) pairing approximation signal a=[α J, 1, α J, 2... α J, nj], wherein j is a decomposed class, j ∈ [1, MaxLev] adopts processing method identical from the step 1) to the step 3):
● at first add up total flow sum=α J, 1+ α J, 2+ ...+α J, njSum is the total flow of approximate signal a,
Its length is nj, represents the length of the approximate signal a that the j level is decomposed, and j is a decomposed class;
● calculate average discharge average=sum/nj;
● pairing approximation signal a prolongs to draw together and is [α J, 1, α J, 2... α J, nj, average, average ... average],
Use average discharge average to carry out boundary extension, signal length is nj+WLen after the continuation.
It is as follows that signal carries out pretreated method:
With initial data according to uniformly-spaced dividing the time of advent, each time interval is as a time slot, add up received length of data package summation in this time slot, with the statistics this time slot in received length of data package summation as signal values to be detected such as this time slots, suppose to have chosen altogether m time slot, then pretreated signal S=[S1, S2 ... Sn].(for example: every 10ms signal is added up once, chosen 1024 time slots altogether, promptly add up altogether 1024 times, obtain waiting for that detection signal is S=[S1, S2 ... S1024]).
It is as follows to judge whether to take place the ddos attack method:
Utilize traffic statistics to carry out the multiple dimensioned detail coefficients d that BORDER PROCESSING obtained and preserved corresponding each yardstick 1, k1, d 2, k2... d I, ki... d MaxLev, kMaxLev, k wherein iFor decomposing the signal length that decomposites in the progression, wherein at each grade d i , k i = [ d i , 1 , d i , 2 , . . . . . . . , d i , k i ] , Under the meaning of mean square error minimum with 1,2 ... MaxLev carries out the linear fit parameter Estimation, calculates the Hurst parameter, can judge whether to take place ddos attack according to Hurst parameter size, and determination methods is as follows:
● when the Hurst parameter greater than 0.6 the time, think that network traffics are normal,
● when the Hurst parameter changes, provide " DDoS may take place " warning information between 0.5-0.6,
● when the Hurst parameter less than 0.5 the time, then judge ddos attack taken place.
Beneficial effect: the present invention proposes a kind of wavelet analysis boundary processing method, being mainly used in to solve utilizes wavelet transformation to find the solution the complexity problem of accuracy in the Hurst parametric procedure, the method that the application of the invention proposes can be avoided over the blindness of boundary processing method, the truth that reflects network signal better judges whether to take place ddos attack exactly.Below we provide specific description:
Accuracy:, do not consider the concrete condition of signal for zero continuation; For periodic extension, can only reflected signal situation at first; For symmetric extension, can only will finish that a part of situation by institute's intercept signal.Utilization can well reflect all features of the signal that is intercepted in certain time period based on the wavelet analysis boundary processing method of traffic statistics, improves the accuracy of Hurst parametric solution, thereby judges whether to take place ddos attack exactly.
Description of drawings
Fig. 1 is based on the ddos attack detection model of network traffics self-similarity.
Fig. 2 is the multiple dimensioned decomposition of Mallat algorithm signal.
Fig. 3 is the overall framework of feature database.
Embodiment
The wavelet analysis boundary processing method that the present invention is based on traffic statistics is used the Mallat algorithm, carry out discrete wavelet and decompose, in multistage decomposable process, each grade signal is carried out traffic statistics, utilize its average discharge as the continuation signal, if wait for that through preliminary treatment detection signal is S=[S1, S2 ... Sn], wherein signal length is n, S1, S2 ..., Sn is the flow that identical appointed interval came out in the time, wavelet filter length is WLen, then its maximum can be separated progression Specifically comprise the steps:
1). the statistics [S1, S2 ... Sn] total flow, computational methods are as follows:
Sum=S1+S2+...+Sn; Sum is a total flow;
2). calculate average discharge, computational methods are as follows:
Average=sum/n; Average is an average discharge:
3). signal S is carried out boundary extension, and method is as follows;
[S1, S2 ... Sn, average, average ... average], use average discharge average to carry out boundary extension, signal length is n+WLen after the continuation;
4). to signal S with small echo high pass, low pass filter carry out convolution and the down-sampling branch is clipped to detail signal d and approximate signal a;
5) pairing approximation signal a=[a J, 1, α J, 2... a J, nj], wherein j is a decomposed class, j ∈ [1, MaxLev] adopts processing method identical from the step 1) to the step 3):
● at first add up total flow sum=α J, 1+ α J, 2+ ...+α J, njSum is the total flow of approximate signal a,
Its length is nj, represents the length of the approximate signal a that the j level is decomposed, and j is a decomposed class;
● calculate average discharge average=sum/nj;
● pairing approximation signal a prolongs to draw together and is [a J, i, α J, 2... α J, nj, average, average ... average],
Use average discharge average to carry out boundary extension, signal length is nj+WLen after the continuation.
For convenience of description, our supposition has following application example:
Every 10ms signal is added up once, added up altogether 1024 times, obtain waiting for that detection signal is S=[S1, S2 ... S1024], the Symlets small echo Sym3 that adopts, its filter length is 6, but its maximum decomposed class is MaxLev=7, and the present invention is specific as follows:
1). the statistics [S1, S2 ... S1024] total flow, computational methods are as follows:
Sum=S1+S2+...+S1024; Sum is a total flow;
2). calculate average discharge, computational methods are as follows:
Average=sum/1024; Average is an average discharge;
3). signal S is carried out boundary extension, and method is as follows;
[S1, S2...S1024, average, average ... average], use average discharge average to carry out boundary extension, signal length is 1030 after the continuation;
4) to signal S with small echo high pass, low pass filter carry out convolution and the down-sampling branch is clipped to detail signal d and approximate signal a;
5) pairing approximation signal a=[a J, 1, a J, 2... ..a J, nj], wherein j is a decomposed class, j ∈ [1, MaxLev] adopts processing method identical from the step 1) to the step 3):
● at first add up total flow sum=a J, 1+ a J, 2+ ...+a J, njSum is the total flow of approximate signal a, and its length is nj, represents the length of the approximate signal a that the j level is decomposed, and j is a decomposed class;
● calculate average discharge average=sum/nj;
● pairing approximation signal a prolongs to draw together and is [a J, 1, a J, 2... a J, nj, average, average ... average], use average discharge average to carry out boundary extension, signal length is nj+WLen after the continuation.
Utilize traffic statistics to carry out the multiple dimensioned detail coefficients d that BORDER PROCESSING obtained and preserved corresponding each yardstick 1, k1, d 2, k2... d I, ki... d MaxLev, kMaxtev(k wherein iFor decomposing the signal length that decomposites in the progression, wherein at each grade d i , k i = [ d i , 1 , d i , 2 , . . . . . . . , d i , k i ] ) , With 1,2......7 carries out the linear fit parameter Estimation under the meaning of mean square error minimum, calculates the Hurst parameter.Can judge whether to take place ddos attack according to Hurst parameter size.Determination methods is as follows:
● when the Hurst parameter greater than 0.6 the time, think that network traffics are normal.
● when the Hurst parameter changes, provide " DDoS may take place " warning information between 0.5-0.6.
● when the Hurst parameter less than 0.5 the time, then judge ddos attack taken place.

Claims (2)

1. wavelet analysis boundary logos based on traffic statistics, it is characterized in that in this method, use the Mallat algorithm, carrying out discrete wavelet decomposes, in multistage decomposable process, each grade signal is carried out traffic statistics, utilize its average discharge as the continuation signal, if wait for that through preliminary treatment detection signal is S=[S1, S2 ... Sn], wherein signal length is n, S1, S2 ..., Sn is the flow that identical appointed interval came out in the time, wavelet filter length is WLen, but its maximum decomposed class then Specifically comprise the steps:
1). the statistics [S1, S2 ... Sn] total flow, computational methods are as follows:
Sum=S1+S2+...+Sn; Sum is a total flow;
2). calculate average discharge, computational methods are as follows:
Average=sum/n; Average is an average discharge;
3). signal S is carried out boundary extension, and method is as follows;
[S1, S2 ... Sn, average, average ... average], use average discharge average to carry out boundary extension, signal length is n+WLen after the continuation;
4). to signal S with small echo high pass, low pass filter carry out convolution and the down-sampling branch is clipped to detail signal d and approximate signal a;
5) pairing approximation signal a=[α J, 1, α J, 2... α J, nj], wherein j is a decomposed class, j ∈ [1, MaxLev] adopts processing method identical from the step 1) to the step 3):
● at first add up total flow sum=α J, 1+ α J, 2+ ...+α J, njSum is the total flow of approximate signal a,
Its length is nj, represents the length of the approximate signal a that the j level is decomposed, and j is a decomposed class;
● calculate average discharge average=sum/nj;
● pairing approximation signal a prolongs to draw together and is [a J, 1, α J, 2... α J, nj, average, average ... average],
Use average discharge average to carry out boundary extension, signal length is nj+WLen after the continuation.
According to claim 1 the wavelet analysis boundary processing method based on traffic statistics of book, it is as follows to it is characterized in that signal carries out pretreated method:
With initial data according to uniformly-spaced dividing the time of advent, each time interval is as a time slot, add up received length of data package summation in this time slot, with the statistics this time slot in received length of data package summation as signal values to be detected such as this time slots, suppose to have chosen altogether m time slot, then pretreated signal S=[S1, S2 ... Sn].
CN2008100192792A 2008-01-18 2008-01-18 A wavelet analysis boundary processing method based on traffic statistics Expired - Fee Related CN101217378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100192792A CN101217378B (en) 2008-01-18 2008-01-18 A wavelet analysis boundary processing method based on traffic statistics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100192792A CN101217378B (en) 2008-01-18 2008-01-18 A wavelet analysis boundary processing method based on traffic statistics

Publications (2)

Publication Number Publication Date
CN101217378A true CN101217378A (en) 2008-07-09
CN101217378B CN101217378B (en) 2010-06-02

Family

ID=39623745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100192792A Expired - Fee Related CN101217378B (en) 2008-01-18 2008-01-18 A wavelet analysis boundary processing method based on traffic statistics

Country Status (1)

Country Link
CN (1) CN101217378B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478457B (en) * 2009-01-16 2011-01-26 华中科技大学 Network flow Self-similar parameter estimation method
CN101977333A (en) * 2010-11-24 2011-02-16 南京信息工程大学 Non-reference image quality evaluating method based on wavelet and structural self-similarity analysis
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN102594836A (en) * 2012-03-06 2012-07-18 青岛农业大学 Flow recognition method based on wavelet energy spectrum
CN104734916A (en) * 2015-03-10 2015-06-24 重庆邮电大学 Efficient multistage anomaly flow detection method based on TCP
CN105046051A (en) * 2015-06-19 2015-11-11 长安大学 Prediction method for number of freeze-thaw actions in actual environment
CN108631894A (en) * 2018-04-12 2018-10-09 东北石油大学 Spectrum pool system optimization method based on optimal wavelet filter
CN109587104A (en) * 2018-02-26 2019-04-05 新华三信息安全技术有限公司 A kind of anomalous traffic detection method, device and equipment
CN110062000A (en) * 2019-04-29 2019-07-26 盐城工学院 The method of real-time detection ddos attack based on Lifting Wavelet
CN111294362A (en) * 2020-03-16 2020-06-16 湖南大学 LDoS attack real-time detection method based on fractal residual error

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1123865C (en) * 2001-12-21 2003-10-08 北京阜国数字技术有限公司 Block effect eliminating method in wavelet voice frequency signal processing

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478457B (en) * 2009-01-16 2011-01-26 华中科技大学 Network flow Self-similar parameter estimation method
CN101977333A (en) * 2010-11-24 2011-02-16 南京信息工程大学 Non-reference image quality evaluating method based on wavelet and structural self-similarity analysis
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN102594836A (en) * 2012-03-06 2012-07-18 青岛农业大学 Flow recognition method based on wavelet energy spectrum
CN102594836B (en) * 2012-03-06 2014-11-05 青岛农业大学 Flow recognition method based on wavelet energy spectrum
CN104734916B (en) * 2015-03-10 2018-04-27 重庆邮电大学 A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol
CN104734916A (en) * 2015-03-10 2015-06-24 重庆邮电大学 Efficient multistage anomaly flow detection method based on TCP
CN105046051A (en) * 2015-06-19 2015-11-11 长安大学 Prediction method for number of freeze-thaw actions in actual environment
CN105046051B (en) * 2015-06-19 2018-01-26 长安大学 A kind of actual environment unfreezing number predictor method
CN109587104A (en) * 2018-02-26 2019-04-05 新华三信息安全技术有限公司 A kind of anomalous traffic detection method, device and equipment
WO2019161768A1 (en) * 2018-02-26 2019-08-29 新华三信息安全技术有限公司 Traffic abnormality detection
CN108631894A (en) * 2018-04-12 2018-10-09 东北石油大学 Spectrum pool system optimization method based on optimal wavelet filter
CN110062000A (en) * 2019-04-29 2019-07-26 盐城工学院 The method of real-time detection ddos attack based on Lifting Wavelet
CN111294362A (en) * 2020-03-16 2020-06-16 湖南大学 LDoS attack real-time detection method based on fractal residual error

Also Published As

Publication number Publication date
CN101217378B (en) 2010-06-02

Similar Documents

Publication Publication Date Title
CN101217378B (en) A wavelet analysis boundary processing method based on traffic statistics
US8619909B2 (en) Signal detector using matched filter for training signal detection
CN102097095A (en) Speech endpoint detecting method and device
CN107154088A (en) Activity personnel amount method of estimation based on channel condition information
CN106850511B (en) Method and device for identifying access attack
CN101848177B (en) Bistable optimal stochastic resonance single-frequency weak signal detection method based on frequency conversion
CN106205606A (en) A kind of dynamic positioning and monitoring method based on speech recognition and system
CN111585662B (en) Classification identification and parameter estimation method and system for phase modulation signal
CN110690931A (en) Digital signal adaptive code rate estimation method and device based on multi-wavelet-base combination
CN117439827B (en) Network flow big data analysis method
CN101515454A (en) Signal characteristic extracting methods for automatic classification of voice, music and noise
CN106357574A (en) BPSK (Binary Phase Shift Keying)/QPSK (Quadrature Phase Shift Keying) signal modulation blind identification method based on order statistic
CN115032693B (en) Method and device for automatically identifying pre-earthquake of strong earthquake
CN111600878A (en) Low-rate denial of service attack detection method based on MAF-ADM
CN102664843A (en) Method and device for single-frequency interference detection and elimination
CN106772271A (en) A kind of radar signal TOA methods of estimation based on matching auto-correlation algorithm
CN116346506B (en) Intelligent protection method for network security data
Phithakkitnukoon et al. A recent-pattern biased dimension-reduction framework for time series data
CN110190917B (en) Frequency spectrum hole sensing method, device and equipment for LTE230MHz power wireless private network
CN116961799A (en) Signal interference detection method based on time-frequency domain distribution characteristics
CN104467995B (en) Blind primary user detection based on HMM and transmission level recognition methods
US8374229B2 (en) Method for the detection and generation of a useful signal and associated devices and communications system
CN110266429A (en) A kind of signal frame structure detection method based on Higher Order Cumulants
Sun et al. Causal relation of queries from temporal logs
CN115378776A (en) MFSK modulation identification method based on cyclic spectrum parameters

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20080709

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000220

Denomination of invention: A wavelet analysis boundary processing method based on traffic statistics

Granted publication date: 20100602

License type: Common License

Record date: 20161121

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000220

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100602

Termination date: 20180118