Home Technology Method of feature extraction of abnormal communication signal in network based on nonlinear technology
Article Open Access

Method of feature extraction of abnormal communication signal in network based on nonlinear technology

  • Baofu Gong EMAIL logo
Published/Copyright: April 24, 2024
Become an author with De Gruyter Brill

Abstract

Accurate extraction of abnormal communication signal features in the network is the basis to ensure the completion of network communication. Therefore, a method of feature extraction of abnormal communication signal in network based on nonlinear technology is proposed. In this method, wavelet transform is adopted to decompose the abnormal network communication signals in the high- and low-frequency bands. According to the distribution characteristics of noise and signal in the frequency band, the corresponding parameters are selected for phase space reconstruction and nonlinear dimension reduction of local tangent space mainstream shape recognition algorithm, and the decomposition coefficients of wavelet packet after noise reduction are reconstructed to realize the nonlinear noise reduction of abnormal signal; the denoised abnormal communication signal in network is mapped to the high-dimensional feature space. The principal component is analyzed in accordance with the nonlinear function in the mapped feature space, and the nonlinear function is solved by self-organizing neural network to output the principal component extraction result. According to test results, this method has a significant signal noise reduction effect, results are more than 92% for different abnormal communication signals, and the features of abnormal signals are accurately extracted.

Notes to mathematical notation

Number Symbol Explanatory note
(1) a The scale of wavelet signal
(2) b The offset of wavelet.
(3) x Random variable
(4) f ( x ) Probability density function of random variable x
(5) R x The autocorrelation of random process x
(6) x i Sample points
(7) k Nearest neighbors X i
(8) Q i Orthogonal basis
(9) d The dimension of subspaces of low dimensional manifolds
(10) Ω i + Moore Penrose generalized inverse of Ω i
(11) X i Respectively the mean values of x ¯ i
(12) T i Respectively the mean values of t ¯ i
(13) m The embedding dimension
(14) p j , k n Wavelet packet decomposition coefficient
(15) n [ 1 , N ] The number of wavelet packet decomposition layers
(16) j [ 0 , 2 n 1 ] The wavelet packet node number
(17) k [ 1 , K ] , K The data length in the wavelet packet node
(18) k [ 1 , K ] , K The data length in the wavelet packet node
(19) τ Phase space reconstruction delay
(20) m Best embedding dimension
(21) P j = [ p 1 , p K ] Phase space matrix of Wavelet packet decomposition coefficients
(22) d Contour dimensions of mainstream shapes
(23) { I k ( ζ , v ) } The subscript set of all elements of the k -th element in the decomposition coefficient of wavelet packet that meet the condition ζ + ( v 1 ) τ = k in the phase space data matrix
(24) C k The number of elements in { I k ( ζ , v ) }
(25) x k Abnormal communication signals input in the network
(26) ϕ ( x k ) The transformed training abnormal communication signal in network sample
(27) v Feature vector
(28) a 1 , . . . , a i constant
(29) α Feature vector
(30) λ j Non-zero eigenvalues
(31) α j ( j = 1 , . . . , N ) Corresponding feature vectors
(32) v j ( j = 1 , . . . , N ) Projection principal components of network communication signals in feature space
(33) U Principal component matrix
(34) F ( ) Nonlinear function
(35) X Inversion results
(36) G ( ) Nonlinear function
(37) h ( X ) Mapping results
(38) l Column vector length
(39) W ( X ) The weight matrix of l × n
(40) b ( X ) The offset parameter vector of l

1 Introduction

With the advancement of network technology, a large number of mobile communication network application software are emerging. Mobile communication network provides convenience for people’s life and production in accordance with its own advantages and obtains the favor of more users. However, the following problems also make people worry, for example, network intrusion, service attack, spreading virus, Trojan horse, information theft and other abnormal behaviors seriously affect users’ information security [1]. In this case, one of the difficulties that needs to be solved immediately among the current network problems is the method to accurately identify these abnormal mobile communication network signals, analyze and monitor the communication network operation in real time and accurately [2] and find the potential security threats in the network operation [3], to achieve the purpose of equating appropriate network strategies in time to respond to potential problems, and to ensure safe and efficient network operation and reduce the harm caused to the normal business of the communication network [4] due to various abnormal events. It is of great importance in improving the security of the mobile communication network [5]. Feature extraction of abnormal communication signal in network is the basis of accurate identification of abnormal signal; abnormal communication signal is a serious behavior that deviates from the expected network traffic. The signal has significant nonlinear features, the signal frequency is complex, and the signal-to-noise spatial distribution of each signal component is different, which greatly improves the difficulty of abnormal communication signal features. To ensure the extraction accuracy of abnormal communication signal in network [6], it is necessary to effectively deal with its nonlinear features and complete the processing of the complex frequency of the signal. In the study by Hindarto and Muntasa [7], wavelet transform was used to extract the energy value on each subband of signal wave to complete the feature extraction of abnormal communication signal; Song [8] proposed a method of feature extraction of transmission signals in electronic communication networks on the basis of symmetric algorithm, which performed threshold denoising and data dimensionality reduction to achieve three-layer wavelet packet decomposition of time-domain transmission signals. The adaptive floating threshold was applied as the threshold of wavelet coefficients of quantized signals, which could efficiently remove noise and retain transmission signals that are valuable. Vasudevan proposed an LPboost Convolutional neural network method based on auction optimization to solve the problem that it is difficult to identify abnormal activities in video surveillance. The background was eliminated based on fuzzy multi-level subtraction, and the object was identified using the region descriptor based on the main bow. Then, the extracted content was classified using the clustering method, and the anomaly was classified using the LPboost convolutional neural network based on auction optimization. The research results indicate that the accuracy of this method is significantly higher than several commonly used models [9]. To improve the efficiency and quality of transmission line fault detection and classification, Fahim et al. proposed a spectrogram analysis technique - convolutional neural network framework based on time series imaging to extract the characteristics of transmission line frequency domain correlation, and used discrete wavelet transform to denoise the fault voltage and current signals. The experimental results show that this method can achieve high-precision classification and detection of transmission line faults, and this method has certain advantages compared to other models [10]. The aforementioned methods can effectively remove the noise when extracting the features of abnormal communication signals, but there are deficiencies in the processing of nonlinear features in signals. In this article, wavelet packet decomposition is adopted to complete the multiscale detailed analysis of signals in both time domain and frequency domain. After processing the nonlinear features of the abnormal communication signal combined with nonlinear technology, the nonlinear dimension of the signal is reduced several times to complete the feature extraction of the abnormal communication signal.

2 Method of feature extraction of abnormal communication signal in network

2.1 Nonlinear processing of abnormal signals based on wavelet packet decomposition and local tangent space arrangement (LTSA)

Due to nonlinear features of abnormal communication signal in network, to accurately extract the features of abnormal communication signal in network [11], the nonlinear processing of abnormal communication signal in network is completed based on the combination of wavelet packet transform and LTSA mainstream shape recognition algorithm. Among them, wavelet transform is adopted to decompose the communication abnormal signal, and the kernel dimension and information dimension are calculated for the detail signal. The signal is orthogonally decomposed into each frequency band, and the noise reduction of time-domain signal is equivalent to the noise reduction of decomposition coefficients of wavelet packet. According to the distribution characteristics of noise and signal in each subband, the corresponding parameters are selected for phase space reconstruction and nonlinear dimension reduction of LTSA mainstream shape recognition algorithm, and the decomposition coefficients of wavelet packet after noise reduction are reconstructed to finally realize the nonlinear noise reduction of signal.

2.1.1 Wavelet packet decomposition

Although the traditional method of feature extraction for abnormal signal in network can be conducted in both time domain and frequency domain and because the abnormal communication signal in network is a nonlinear signal, the traditional time-domain analysis and frequency–domain analysis are global transformation changes, the abnormal signal cannot be analyzed in both time domain and frequency domain at the same time. Wavelet decomposition can transform the abnormal signal locally in time and frequency domain and effectively extract the abnormal information [12]. It can refine and analyze the abnormal signal in multiscale, so it is suitable for nonlinear feature extraction. Wavelet packet analysis can provide a more refined analysis method for signals. Wavelet packet analysis divides the time–frequency plane into more detailed parts, and its resolution for the high-frequency part of the signal is higher than that of the dyadic wavelet. Moreover, it introduces the concept of optimal basis selection based on the wavelet analysis theory. That is, after dividing the frequency band into multiple levels, the optimal basis function is adaptively selected based on the characteristics of the analyzed signal to match it with the signal, to improve the signal analysis ability. Therefore, wavelet packets have the extensive application value, so this study will choose wavelet packet transform as the algorithm for this study. The expression of the basic wavelet is given as follows:

(1) ψ a , b ( t ) = 1 a ψ t b a ,

where a is the scale of wavelet signal and b is the offset of wavelet.

The basic wavelet transforms the scale and displacement to make the inner product with the original signal, and the result is the wavelet coefficient. This process is called continuous wavelet transform. However, to facilitate the analysis of abnormal signals [13], discrete wavelet transform is adopted in this article, and its expression is expressed as follows [14]:

(2) ψ m , n ( t ) = 2 m / 2 ψ ( 2 m t n ) .

After the discrete wavelet decomposition of the original abnormal signal, the characteristic solutions of the abnormal signal can be obtained in high frequency and low frequency. To illustrate the effectiveness of higher order cumulants in nonlinear abnormal signal processing, the concept of characteristic function is first introduced. It lets the probability density function of random variable x be f ( x ) , and the first characteristic function equation of random variable is given as follows:

(3) Φ ( ω ) = E [ e i ω x ] = e j ω x d F ( x ) = e j ω x f ( x ) d x .

The second characteristic function equation of x is:

(4) ϕ ( ω ) = ln Φ ( ω ) .

For random vector x , its higher-order cumulant can be defined as follows:

(5) C v 1 , v 2 , , v k = ( j ) r r ϕ ( ω 1 , ω 2 , , ω k , ) w 1 v 1 w 2 v 2 w k v k | ω 1 = ω 2 = = ω k = 0 ,

where r = v 1 , v 2 , , v k ; the k -order cumulant of zero mean stationary random vector x = ( x 1 , x 2 x k ) is given as follows:

(6) C k x ( τ 1 , τ 1 τ k 1 ) = cum ( x ( t ) , x ( t τ 1 ) x ( t τ k 1 ) ) .

Given the random process x , the first- to fourth-order cumulants are calculated by the following method:

(7) C 1 x = E [ x ( n ) ] C 2 x ( i ) = E [ x ( n ) x ( n + i ) ] C 3 x ( i , j ) = E [ x ( n ) x ( n + i ) x ( n + j ) ] C 4 x ( i , j , k ) = E [ x ( n ) x ( n + i ) x ( n + j ) x ( n + k ) ] R x ( i ) R x ( j k ) R x ( j ) R x ( k j ) R x ( k ) R x ( i j ) ,

where R x is the autocorrelation of random process x .

It demonstrates that the mean and the mean square difference of the first-order cumulants and the second-order cumulants are the embodiment of the basic information in the signal; the third-order and the fourth-order cumulants of Gaussian random variable x are always zero. Therefore, when the signal conforms to the Gaussian process, the colored noise can be completely eliminated theoretically, reflecting the nonlinear features of autocorrelation in the abnormal signal. Therefore, this article adopts the second-order cumulants, the third-order cumulants, and the fourth-order cumulants as the method of feature extraction.

2.1.2 LTSA mainstream shape recognition algorithm

LTSA is a very effective nonlinear dimension reduction method. It is mainly used to describe the local geometry of the manifold by the low-dimensional tangent space in the neighborhood of sample points, and then to globally arrange the low-dimensional tangent space to obtain the low-dimensional global coordinates of sample points. Aiming at the correlation features between nonlinear and nonstationary abnormal signals generated in the process of network communication [15], in accordance with the correlation features between abnormal signal features, the LTSA in the nonlinear manifold learning method can eliminate a large amount of redundant information, reduce the signal noise, and improve the sensitivity of abnormal signal features. It can effectively obtain the internal low-dimensional manifold structure, which is embedded in high-dimensional space and mine the internal essential features of abnormal communication signal in networks. Therefore, on the basis of wavelet decomposition, this article uses LTSA mainstream shape recognition algorithm to further complete the signal denoising.

The signal set X = { x i R D ; i = 1 , , N } is composed of the signal after wavelet decomposition. The main shape recognition using LTSA algorithm mainly includes the following steps:

  1. Construct neighborhood: For each sample point x i , determine its k nearest neighbors X i , and X i = [ x i 1 , x i 2 , , x i k ] . The number of samples contained in the sample set is N .

  2. Extract local information: Select a set of orthogonal bases Q i in the neighborhood of data sample point x i , project X i onto Q i , and mine the main information of signals in the neighborhood [16]. In the solution process, Q i is mainly composed of the eigenvectors consistent with the d maximum eigenvalues of ( X i H k ) ( X i H k ) T , where d is the dimension of the low dimensional manifold subspace, the local low dimensional coordinates of X i are Ω i = Q i T X i H k , and H k = I e e T / k is the centralization matrix.

  3. The local tangent space global arrangement can be converted into a minimization problem’s approximate solution process, and its equation is given as follows [17]:

    (8) arg min T i = 1 N E i = arg min i = 1 i = 1 N T i H k L i Ω i ,

    where the global low dimensional coordinate of X i is T i = [ t i 1 , , t i k ] . In accordance with the equation, when L i = T i H k Ω i + , the mapping error is the minimum, and Ω i + is the Moore Penrose generalized inverse of Ω i .

  4. Mainstream shape reconstruction: After obtaining the low-dimensional coordinates T = [ t 1 , , t N ] of all signals, the mainstream shape is reconstructed in its high-dimensional space by Eq. (9):

(9) x ¯ i = x i + Q i L i 1 t i Q i L i 1 t ¯ i ,

where X i and T i are, respectively, the mean values of x ¯ i and t ¯ i ; the generalized inverse of L i is L i . Finally, the mainstream shape Y R m × N in high-dimensional space is obtained; the embedding dimension is expressed in m .

2.1.3 Overall process

Based on the above two parts, the overall flow of nonlinear signal processing based on wavelet packet transform and LTSA is obtained. The steps are as follows:

  1. The wavelet packet is used to decompose the one-dimensional time series x ( t ) , t = 1 , 2 , , T , and the corresponding wavelet packet decomposition coefficient p j , k n is obtained, where n [ 1 , N ] is the number of wavelet packet decomposition layers, j [ 0 , 2 n 1 ] is the wavelet packet node number, and k [ 1 , K ] , K is the data length in the wavelet packet node.

  2. For each wavelet packet decomposition node, the pseudo-nearest neighbor and mutual information methods are used to select the phase space reconstruction time delay τ and the best embedding dimension m , and the phase space matrix of wavelet packet decomposition coefficient P j = [ p 1 , p K ] is obtained, in which the point in phase space p K = ( p j , t N , p j , 1 + τ N , p j , 1 + ( m 1 ) τ N ) .

  3. The adaptive maximum likelihood estimation method is adopted to estimate the eighth dimension d of the mainstream shape, and LTSA is adopted to reduce the nonlinear dimension of p j to obtain the low dimensional matrix P j ¯ = [ p ¯ 1 , p ¯ 1 ] R d .

  4. The wavelet packet decomposition coefficient after noise reduction is inversely obtained by Eq. (2):

(10) p ¯ j , k n = p ¯ ζ , v ( ζ , v ) I k ( ζ , v ) C k ,

where { I k ( ζ , v ) } represents the subscript set of all elements of the k th element in the decomposition coefficient of wavelet packet that meet the condition ζ + ( v 1 ) τ = k in the phase space data matrix, v [ 1 , m ] , ζ [ 0 , K ( m 1 ) τ ] , and C k is the number of elements in { I k ( ζ , v ) } . The wavelet packet decomposition coefficient is reconstructed to obtain the denoised signal. The signal nonlinear processing flow based on wavelet packet transform and LTSA is shown in Figure 1.

Figure 1 
                     Signal nonlinear processing flow based on wavelet packet transform and LTSA.
Figure 1

Signal nonlinear processing flow based on wavelet packet transform and LTSA.

Figure 1 shows that in the process of nonlinear signal processing based on wavelet packet transform and LTSA, it is necessary to first process the one-dimensional noise signal time series and then use the wavelet packet decomposition coefficients to reconstruct the phase space of the wavelet packet decomposition coefficients. Before the reconstruction, it is necessary to determine the time delay and embedding size, and after the reconstruction is completed, the mainstream shape of LTSA is identified. Then it carries out one-dimensional wavelet packet decomposition coefficient reconstruction and wavelet packet decomposition and reconstruction. After these operations are completed, the process can be ended.

2.2 Feature extraction of abnormal communication signals in network

2.2.1 Feature extraction

Principal component analysis (PCA) is an optimal orthogonal transformation based on the statistical features of the target and has the ability to extract the maximum descriptive features in the mode. However, PCA is a linear algorithm, which only considers the second-order statistical features in the data. When there are massive nonlinear relationships in the features of network communication signals, it cannot meet the requirements [18]. Therefore, kernel principal component analysis (KPCA), which is formed by the organic integration of PCA and kernel learning method is not only suitable for dealing with nonlinear problems but also can provide more information. KPCA realizes the selection of important characteristic variables while classifying in accordance with the size of energy entropy. Based on the analysis of network communication signals without assuming the distribution of signals [19], the nonlinear processing and dimensionality reduction of signals are realized by mapping the input space to the high-dimensional feature space.

The basic idea of KPCA is to map the abnormal communication signal in the network denoised in Section 2.1 to a high-dimensional feature space [20] through a nonlinear mapping and then to carry out linear principal component analysis on the feature space. Assuming that the input abnormal communication signals x k in network are mapped to ϕ ( x k ) , and they have been centralized, that is, the condition of Eq. (11) is satisfied, there is [21]:

(11) k = 1 N ϕ ( x k ) = 0 ,

where x k ( k = 1 , , N ) is N abnormal communication signal samples of input training network and ϕ ( x k ) is the transformed training abnormal communication signal in network sample.

Covariance matrix C of abnormal communication signal sample of training network after mapping is given as follows:

(12) C = 1 N k = 1 N ϕ ( x j ) k = 1 N ϕ ( x j ) T .

The following characteristic equations are solved:

(13) λ v = C v .

In accordance with the reproducing kernel theory, the eigenvector v must be located in the space composed of ϕ ( x 1 ) , . . . , ϕ ( x N ) , that is, it can be expressed by the linear combination of ϕ ( x 1 ) , . . . , ϕ ( x N ) :

(14) v = i = 1 N a i ϕ ( x i ) ,

where a 1 , . . . , a i is a constant.

Define a N × N matrix K :

(15) K i j = ϕ ( x i ) T ϕ ( x j ) .

Eq. (15) is also called the kernel matrix. By substituting Eqs. (12), (14), and (15) into Eq. (13), we obtain:

(16) K α = N λ α .

In this way, the problem of solving the eigenvector v of Eq. (13) is transformed into finding the eigenvector α of eigenequation (15). From Eq. (15), it can be seen that the nuclear matrix K is a symmetric, semi positive definite square matrix, and its eigenvalue will be nonnegative. By solving the characteristic Eq. (16), a set of nonzero eigenvalues λ j and the corresponding eigenvector α j ( j = 1 , . . . , N ) satisfying the normalization condition can be obtained. The condition expression satisfied is given as follows:

(17) λ j ( α j , α j ) = 1 .

In accordance with Eq. (14), the projected principal component [22] of the network communication signal in the feature space can be obtained, which is represented by v j ( j = 1 , . . . , N ) .

Let x be a test sample, then its projection on v j is given as follows [23]:

(18) ( v j ) T ϕ ( x ) = i = 1 N a i j ϕ ( x i ) T ϕ ( x i ) = i = 1 N a i j K ( x i , x ) .

In accordance with the aforementioned steps, the projection feature vector of the original network communication signal can be obtained. In the aforementioned process, the selection process of principal component V is the process of feature extraction of abnormal communication signals in network.

KPCA is an extension of PCA. Its coordinates are nonlinear, that is, the nonlinear function representing X can be expressed by the principal component matrix U , and its equation is given as follows:

(19) U = F ( X ) ,

where F ( ) represents a nonlinear function, and its principal component inverse transformation is also nonlinear [24]. The calculation equation of inverse result X is given as follows:

(20) X = G ( U ) ,

where G ( ) is also a nonlinear function. After obtaining the results in accordance with the above equation, important principal variables are selected to represent the most important information contained in the sample data.

In the process of feature extraction, KPCA guarantees the principle of minimum mean square deviation between cost functions X and X , and it is expressed as follows:

(21) min = i = 1 n ( X i ) 2 ( X i ) 2 ,

where X i is the i th component of X and X i is the i th component of X .

2.2.2 Determination of nonlinear function

To ensure the best feature extraction, the two nonlinear functions of F ( ) and G ( ) should be determined. This article is completed based on self-organizing neural network. Figure 2 shows the network structure.

Figure 2 
                     Structure based on self-organizing neural network.
Figure 2

Structure based on self-organizing neural network.

Self-organizing neural network is a five-layer forward network composed of two self-organizing neural networks, which consists of one input layer, one output layer, and three hidden layers. The input layer and output layer are n neurons, and the hidden layer in the middle is also called bottleneck layer. It is not only the output of the front self-organizing neural network but also the input of the back self-organizing neural network. The extracted main metadata can be used for the subsequent signal analysis [25].

The nonlinear transformation function f 1 is used for mapping the input vector X to the first hidden layer. The mapping result is h ( X ) , and the column vector length is l , then:

(22) h i ( X ) = f 1 ( ( W ( X ) X + b ( X ) ) i ) ,

where the weight matrix of l × n is W ( X ) ; the offset parameter vector of l is b ( X ) , where i = 1 , 2 , . . . , l . The transformation function f 2 is adopted to map h ( X ) to the bottleneck layer to obtain the main element vector U with only one element μ , which is expressed as follows:

(23) μ = f 2 ( ω ( X ) h ( X ) + b ¯ ( X ) ) .

Generally, f 1 uses hyperbolic tangent function and f 2 selects the identity function. The mapping relationship between f 1 and f 2 constitutes F ( ) , so as to realize the dimensionality reduction extraction process of nonlinear principal component U .

After extracting the nonlinear principal component U , the nonlinear transformation function f 3 is selected to map U to the third hidden layer. The mapping result is h ( U ) , and its equation is given as follows:

(24) h i ( U ) = f 3 ( ( W ( U ) U + b ( U ) ) i ) ,

where i = 1 , 2 , . . . , l .

The nonlinear transformation function f 4 is adopted to map h ( U ) to the output layer to obtain the vector with n elements. The equations are given as follows:

(25) X = [ X 1 , X 1 , , X n ] T ,

(26) X i = f 4 ( ( W ( U ) h ( U ) + b ¯ ( U ) ) i ) .

When selecting the nonlinear transformation function, f 1 and f 3 select the same nonlinear function; f 2 and f 4 select the same nonlinear function [26], and the mapping relationship between f 3 and f 4 constitutes G ( ) , so as to realize the mapping process from U to X .

The minimum value of the cost function of Eq. (19) is obtained by finding the optimal W ( X ) , ω ( X ) , b ¯ ( X ) , W ( U ) , and b ¯ ( U ) , so as to minimize the variance between the output X and the original X achieved by the neural network. When f 2 and f 4 select identity functions, we obtain [27]:

(27) μ = ω ( X ) h ( X ) + b ¯ ( X ) ,

(28) X i = ( W ( U ) h ( U ) + b ¯ ( U ) ) .

Based on the aforementioned steps, the feature extraction of abnormal communication signal in network is completed.

3 Experimental analysis

To verify the performance and effect of the proposed method, a 500 megabit fiber-optic network server system in a laboratory is used as an example, and the communication state is simulated by MATLAB software. The parameter settings of the experimental environment are shown in Table 1.

Table 1

Experimental environment parameter setting

Number Project Size Unit
#1 Memory 1,024 GB
#2 Operating system Windows XP /
#3 Programming tools Python, C++ /

The network system includes a total of one access line and 15 internal wiring. Five of them are internal key lines. The time domain waveform and spectrum results of the simulation signal including malicious attack, communication interference, and signal tampering under the condition of 5 dB noise of the communication signal system are shown in Figures 3 and 4.

Figure 3 
               Time-domain waveform of simulation signal.
Figure 3

Time-domain waveform of simulation signal.

Figure 4 
               Spectrum results of simulated signals.
Figure 4

Spectrum results of simulated signals.

The proposed method is adopted to decompose the above simulation signals by wavelet packet. However, to ensure the decomposition results, the optimal values of the reconstruction time delay and the optimal embedding dimension in the decomposition process of this method should be determined. Taking the decomposed noise results as the measurement standard, the noise values in the decomposed signals under different parameter values are tested. The results are shown in Figure 5.

Figure 5 
               Test results of parameter values.
Figure 5

Test results of parameter values.

In accordance with the test results in Figure 5, the noise value fluctuates obviously under different reconstruction time delays, and the noise result is the lowest when the values are 4 and 5; when the optimal embedding dimension is 10, the noise value is the minimum. Combined with the reconstruction time delay results of 4 and 5, the minimum value is selected as the final result. Therefore, the optimal values of reconstruction time delay and optimal embedding dimension are 4 and 10, respectively, which are used in subsequent experiments.

To test the noise reduction effect of the proposed method, the proposed method is adopted for noise reduction of simulation signals. Figures 6 and 7 show the results. The ideal maximum signal spectrum is 0.105.

Figure 6 
               Time-domain waveform after denoising.
Figure 6

Time-domain waveform after denoising.

Figure 7 
               Spectrum after denoising.
Figure 7

Spectrum after denoising.

According to the test results in Figures 6 and 7, after noise reduction by the proposed method, the noise intensity in the signal is low, and there is only a small amount of noise components. It can be seen from the signal spectrum that the amplitude of the simulated signal after noise reduction is 0.1022, and the difference between the ideal signals is very small. The results clearly indicate that the proposed method has a good noise reduction effect.

To test the abnormal communication signals in network feature extraction performance of the proposed method, the resolution and sensitivity of the proposed method to three abnormal communication signals in both time domain and frequency domain are tested with the resolution and sensitivity as the test standard. Table 2 shows the results.

Table 2

Test results of resolution and sensitivity in both time domain and frequency domain, of three abnormal communication signals

Test content Frequency(f/Hz) Malicious attack Communication interference Signal tampering
Time domain features Frequency domain features Time domain features Frequency domain features Time domain features Frequency domain features
Resolution/% 100 95.23 94.25 93.58 92.26 93.38 95.24
300 95.59 95.57 94.22 94.56 94.47 94.84
500 97.01 95.62 94.37 94.67 96.12 93.97
700 94.98 93.76 95.26 92.98 95.53 94.33
900 96.59 94.11 97.54 93.37 94.76 93.88
Sensitivity/% 100 93.66 92.98 96.63 93.64 94.38 92.96
300 95.36 95.02 95.46 95.34 93.82 95.15
500 92.49 96.13 92.28 95.22 94.25 94.47
700 95.47 93.67 96.01 94.67 93.94 95.06
900 94.65 94.33 94.41 95.27 95.22 94.62

According to the test results shown in Table 2, under different frequencies, the resolution and sensitivity of the proposed method to the time domain and frequency domain of the three abnormal communication signals are more than 92%, and the increase of frequency has a little impact on the resolution and sensitivity of the proposed method, indicating that the text method has good performance in extracting the features of abnormal communication signals in networks and has high resolution and sensitivity.

To test the feature extraction effect of the proposed method, the cumulative contribution rate of the eigenvalues of three network abnormal signals under different signal feature quantities is tested, so as to measure the extraction effect of this method. Table 3 shows the results. Among them, the number of signal features whose cumulative contribution rate is more than 90% is the principal component of the eigenvector of the abnormal signal.

Table 3

Test results of eigenvalue cumulative contribution rate of three network abnormal signals (%)

Characteristic quantity/unit Malicious attacks Communication interference Signal is tampered with
1 42.4 46.2 43.7
2 50.6 51.8 55.2
3 71.7 73.2 74.3
4 84.5 85.6 82.5
5 94.6 95.2 94.4
6 98.2 97.8 96.8
7 100 100 100
8 100 100 100
9 100 100 100
10 100 100 100

According to the test results shown in Table 3, when there are five eigenvalues, the cumulative contribution rate of the eigenvalues of the three network abnormal signals reaches more than 90%, and when the number reaches 7, the cumulative contribution rate of eigenvalues of the abnormal signal networks reaches 100%. According to the results, the method proposed has good effect of feature extraction and can complete the characterization of most information of abnormal signal when the number of features is 5, that is, the feature extraction of abnormal signal can be completed at this time.

4 Discussion

The research object of nonlinear technology theory is nonlinear phenomenon. It is a kind of phenomenon that reflects the motion essence of nonlinear system, which cannot be explained by the theory of linear system. The main nonlinear phenomena include the frequency of dependence on amplitude, multivalued response and jumping resonance, subharmonic oscillation, asynchronous suppression, frequency capture, self-excited oscillation, bifurcation, and chaos. Abnormal communication signal in network is a typical nonlinear problem. By extracting the features of the signal, we can judge the operational state of the network and ensure the operational safety of the network. In this article, when extracting the features of abnormal communication signal in networks, nonlinear technology is adopted in the two steps of signal denoising and feature extraction, which are LTSA and KPCA, respectively. The combination of the two nonlinear technologies first reduces the signal noise and then extracts the features. The combination of the two methods can deal with the nonlinear problems in the signal to the greatest extent.

5 Conclusion

With the fast growth of information and communication technology, the communication network has become an indispensable information medium in people’s daily lives. However, the open communication network and its bearer protocol not only bring convenience to people but also cause great hidden dangers to network security. To ensure safe and efficient network operation, reduce the harm caused by different abnormal events to the normal communication network business, and build a credible communication network environment, the communication network operation should be analyzed and monitored in real time and accurately, and the security hidden dangers existing in the network operation should be found to equationte relevant network strategies in time to respond to and deal with potential problems. Among them, the feature extraction of abnormal signal is the basis for the analyzing and monitoring the operating state of communication network. Based on this, a method of feature extraction of abnormal communication signals in network is proposed based on nonlinear technology. After the nonlinear processing of abnormal signal is completed by wavelet packet decomposition and LTSA, the feature extraction of abnormal signal is completed by KPCA, which is formed by the fusion of PCA and kernel learning method. According to the test results, this method can significantly reduce the noise in the signal, has good abnormal signal sensitivity and resolution, and can accurately extract the principal components of abnormal signals under the two parameters of optimal reconstruction time delay and optimal embedding dimension.

  1. Funding information: The author states no funding involved.

  2. Author contributions: The author has accepted responsibility for the entire content of this manuscript and approved its submission.

  3. Conflict of interest: The author states no conflict of interest.

  4. Data availability statement: Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

References

[1] Ma Y, Quan Z, Li D, Zhang S, Li X, Feng Z. Optimal linear cooperation for signal classification in cognitive communication networks. IEEE Trans Wirel Commun. 2020;19(5):3144–55.10.1109/TWC.2020.2970714Search in Google Scholar

[2] Lili MA, Liu J. Research on abnormal data detection of optical fiber communication network based on data mining. J Appl Opt. 2020;41(6):1305–10.10.5768/JAO202041.0608003Search in Google Scholar

[3] Shrivastava AK, Das D, Mahapatra R. Performance evaluation of mobile molecular communication system using neural network detector. IEEE Wirel Commun Lett. 2021;99:1.10.1109/LWC.2021.3079522Search in Google Scholar

[4] Pan X, Wang X, Tian B, Wang C, Guizani M. Machine-learning-aided optical fiber communication system. IEEE Netw. 2021;35(4):136–42.10.1109/MNET.011.2000676Search in Google Scholar

[5] Sharma S, Roy SD, Kundu S. Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming. Wirel Netw. 2020;26(2):1151–64.10.1007/s11276-018-1859-0Search in Google Scholar

[6] Li K, Zhang J, Lei Y, Ra C. A novel fingerprint method of feature extraction for communication radiation source. J Intell Fuzzy Syst. 2019;37(1 Pt.1):351–9.10.3233/JIFS-179091Search in Google Scholar

[7] Hindarto, Muntasa A. Wavelet sub-band energy for feature extraction of electro encephalo graph (eeg) signals. J Eng Sci Technol. 2019;14(2):578–88.Search in Google Scholar

[8] Song D. Method of feature extraction of transmission signal in electronic communication network based on symmetric algorithm. Symmetry. 2019;11(3):410.10.3390/sym11030410Search in Google Scholar

[9] Fahim SR, Sarker Y, Sarker SK, Sheikh MRI, Das SK. Self attention convolutional neural network with time series imaging based feature extraction for transmission line fault detection and classification. Electr Power Syst Res. 2020;187(Oct.):106437.1–12.10.1016/j.epsr.2020.106437Search in Google Scholar

[10] Vasudevan V. Abnormal activities detection from video surveillance using the auction optimization based lpboost convolution neural network. Solid State Technol. 2020;63(3):1474–84.Search in Google Scholar

[11] Liu Z, Guan W, Wen S. Improved target signal source tracking and extraction method based on outdoor visible light communication using an improved particle filter algorithm based on cam-shift algorithm. IEEE Photonics J. 2019;99:1.10.1109/JPHOT.2019.2940773Search in Google Scholar

[12] Venkata G, Prasad H, Thalluri LN. Enhanced performance of pcg signal using effective method of feature extraction. Int J Recent Technol Eng. 2020;9(2):2277–3878.10.35940/ijrte.E6936.018520Search in Google Scholar

[13] Sun H, Fang L, Zhao F. A fault method of feature extraction for single-channel signal of rotary machinery based on vmd and kica. J Vibroeng. 2019;21(2):370–83.10.21595/jve.2018.20073Search in Google Scholar

[14] Jin W, Changqing Z, Shiming H, Yu G, Osama A, Ahed A. LogUAD: Log unsupervised anomaly detection based on Word2Vec. Comput Syst Sci Eng. 2022;41(3):1207–22.10.32604/csse.2022.022365Search in Google Scholar

[15] Zhou X, Cui Y, Ma N, Liu X, Wang L. Influence of characteristic parameters of signal on fault feature extraction of singular value method. J Vibroeng. 2020;22(3):536–55.10.21595/jve.2019.20735Search in Google Scholar

[16] Cen C, Kenli L, Sin G, Teo XZ, Keqin L, Zeng Z. Citywide traffic flow prediction based on multiple gated spatio-temporal convolutional neural networks. ACM Trans Knowl Discov Data. 2020;14(4):1–42.10.1145/3385414Search in Google Scholar

[17] Al-Quayed F, Soudani A, Al-Ahmadi S. Lightweight method of feature extraction for efficient acoustic-based animal recognition in wireless acoustic sensor networks. EURASIP J Wirel Commun Netw. 2020;2020(1):1–21.10.1186/s13638-020-01878-zSearch in Google Scholar

[18] Huang Z, Li C, Lv Q, Su R, Zhou K. Automatic recognition of communication signal modulation based on the multiple-parallel complex convolutional neural network. Wirel Commun Mob Comput. 2021;2021(4):1–11.10.1155/2021/5006248Search in Google Scholar

[19] Wang J, Yang Y, Wang T, Sherratt R, Zhang J. Big data service architecture: a survey. J Internet Technol. 2020;21(2):393–405.Search in Google Scholar

[20] Yan LC. Research on network communication signal processing recognition based on deep learning. Telecommun Radio Eng. 2020;79(7):583–92.10.1615/TelecomRadEng.v79.i7.40Search in Google Scholar

[21] Hosseininia M, Heydari MH, Ghaini F, Avazzadeh Z. A meshless technique based on the moving least squares shape functions for nonlinear fractal-fractional advection-diffusion equation. Eng Anal Bound Elem. 2021;127(8):8–17.10.1016/j.enganabound.2021.03.003Search in Google Scholar

[22] Zhang J, Zhong S, Wang T, Chao H-C, Wang J. Blockchain-based systems and applications: a survey. J Internet Technol. 2020;21(1):1–14.Search in Google Scholar

[23] Fan B, Zheng CX, Tang LR, Wu RZ. Critical nodes identification for vulnerability analysis of power communication networks. IET Commun. 2020;14(4):703–13.10.1049/iet-com.2019.0179Search in Google Scholar

[24] Wang Z, Xu G, Zhang N, Qi Z, He L. Ferry node identification model for the security of mobile ad hoc network. Secur Commun Networks. 2021;2021(3):1–13.10.1155/2021/6682311Search in Google Scholar

[25] Guo J, Wang J, Wen CK, Jin S, Li GY. Compression and acceleration of neural networks for communications. IEEE Wirel Commun. 2020;99:1–8.10.1109/MWC.001.1900473Search in Google Scholar

[26] Zhang HB. Simulation of depth spectrum method of feature extraction for speech signal under mel frequency. Comput Simul. 2020;37(05):202–72.Search in Google Scholar

[27] Akram T, Lodhi HMJ, Naqvi SR, Naeem S, Alhaisoni M, Ali M, Qadri NN. A multilevel features selection framework for skin lesion classification. Human-Centrics Comput Inf Sci. 2020;10(12):1–26.10.1186/s13673-020-00216-ySearch in Google Scholar

Received: 2023-02-27
Revised: 2023-08-09
Accepted: 2023-12-01
Published Online: 2024-04-24

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Editorial
  2. Focus on NLENG 2023 Volume 12 Issue 1
  3. Research Articles
  4. Seismic vulnerability signal analysis of low tower cable-stayed bridges method based on convolutional attention network
  5. Robust passivity-based nonlinear controller design for bilateral teleoperation system under variable time delay and variable load disturbance
  6. A physically consistent AI-based SPH emulator for computational fluid dynamics
  7. Asymmetrical novel hyperchaotic system with two exponential functions and an application to image encryption
  8. A novel framework for effective structural vulnerability assessment of tubular structures using machine learning algorithms (GA and ANN) for hybrid simulations
  9. Flow and irreversible mechanism of pure and hybridized non-Newtonian nanofluids through elastic surfaces with melting effects
  10. Stability analysis of the corruption dynamics under fractional-order interventions
  11. Solutions of certain initial-boundary value problems via a new extended Laplace transform
  12. Numerical solution of two-dimensional fractional differential equations using Laplace transform with residual power series method
  13. Fractional-order lead networks to avoid limit cycle in control loops with dead zone and plant servo system
  14. Modeling anomalous transport in fractal porous media: A study of fractional diffusion PDEs using numerical method
  15. Analysis of nonlinear dynamics of RC slabs under blast loads: A hybrid machine learning approach
  16. On theoretical and numerical analysis of fractal--fractional non-linear hybrid differential equations
  17. Traveling wave solutions, numerical solutions, and stability analysis of the (2+1) conformal time-fractional generalized q-deformed sinh-Gordon equation
  18. Influence of damage on large displacement buckling analysis of beams
  19. Approximate numerical procedures for the Navier–Stokes system through the generalized method of lines
  20. Mathematical analysis of a combustible viscoelastic material in a cylindrical channel taking into account induced electric field: A spectral approach
  21. A new operational matrix method to solve nonlinear fractional differential equations
  22. New solutions for the generalized q-deformed wave equation with q-translation symmetry
  23. Optimize the corrosion behaviour and mechanical properties of AISI 316 stainless steel under heat treatment and previous cold working
  24. Soliton dynamics of the KdV–mKdV equation using three distinct exact methods in nonlinear phenomena
  25. Investigation of the lubrication performance of a marine diesel engine crankshaft using a thermo-electrohydrodynamic model
  26. Modeling credit risk with mixed fractional Brownian motion: An application to barrier options
  27. Method of feature extraction of abnormal communication signal in network based on nonlinear technology
  28. An innovative binocular vision-based method for displacement measurement in membrane structures
  29. An analysis of exponential kernel fractional difference operator for delta positivity
  30. Novel analytic solutions of strain wave model in micro-structured solids
  31. Conditions for the existence of soliton solutions: An analysis of coefficients in the generalized Wu–Zhang system and generalized Sawada–Kotera model
  32. Scale-3 Haar wavelet-based method of fractal-fractional differential equations with power law kernel and exponential decay kernel
  33. Non-linear influences of track dynamic irregularities on vertical levelling loss of heavy-haul railway track geometry under cyclic loadings
  34. Fast analysis approach for instability problems of thin shells utilizing ANNs and a Bayesian regularization back-propagation algorithm
  35. Validity and error analysis of calculating matrix exponential function and vector product
  36. Optimizing execution time and cost while scheduling scientific workflow in edge data center with fault tolerance awareness
  37. Estimating the dynamics of the drinking epidemic model with control interventions: A sensitivity analysis
  38. Online and offline physical education quality assessment based on mobile edge computing
  39. Discovering optical solutions to a nonlinear Schrödinger equation and its bifurcation and chaos analysis
  40. New convolved Fibonacci collocation procedure for the Fitzhugh–Nagumo non-linear equation
  41. Study of weakly nonlinear double-diffusive magneto-convection with throughflow under concentration modulation
  42. Variable sampling time discrete sliding mode control for a flapping wing micro air vehicle using flapping frequency as the control input
  43. Error analysis of arbitrarily high-order stepping schemes for fractional integro-differential equations with weakly singular kernels
  44. Solitary and periodic pattern solutions for time-fractional generalized nonlinear Schrödinger equation
  45. An unconditionally stable numerical scheme for solving nonlinear Fisher equation
  46. Effect of modulated boundary on heat and mass transport of Walter-B viscoelastic fluid saturated in porous medium
  47. Analysis of heat mass transfer in a squeezed Carreau nanofluid flow due to a sensor surface with variable thermal conductivity
  48. Navigating waves: Advancing ocean dynamics through the nonlinear Schrödinger equation
  49. Experimental and numerical investigations into torsional-flexural behaviours of railway composite sleepers and bearers
  50. Novel dynamics of the fractional KFG equation through the unified and unified solver schemes with stability and multistability analysis
  51. Analysis of the magnetohydrodynamic effects on non-Newtonian fluid flow in an inclined non-uniform channel under long-wavelength, low-Reynolds number conditions
  52. Convergence analysis of non-matching finite elements for a linear monotone additive Schwarz scheme for semi-linear elliptic problems
  53. Global well-posedness and exponential decay estimates for semilinear Newell–Whitehead–Segel equation
  54. Petrov-Galerkin method for small deflections in fourth-order beam equations in civil engineering
  55. Solution of third-order nonlinear integro-differential equations with parallel computing for intelligent IoT and wireless networks using the Haar wavelet method
  56. Mathematical modeling and computational analysis of hepatitis B virus transmission using the higher-order Galerkin scheme
  57. Mathematical model based on nonlinear differential equations and its control algorithm
  58. Bifurcation and chaos: Unraveling soliton solutions in a couple fractional-order nonlinear evolution equation
  59. Space–time variable-order carbon nanotube model using modified Atangana–Baleanu–Caputo derivative
  60. Minimal universal laser network model: Synchronization, extreme events, and multistability
  61. Valuation of forward start option with mean reverting stock model for uncertain markets
  62. Geometric nonlinear analysis based on the generalized displacement control method and orthogonal iteration
  63. Fuzzy neural network with backpropagation for fuzzy quadratic programming problems and portfolio optimization problems
  64. B-spline curve theory: An overview and applications in real life
  65. Nonlinearity modeling for online estimation of industrial cooling fan speed subject to model uncertainties and state-dependent measurement noise
  66. Quantitative analysis and modeling of ride sharing behavior based on internet of vehicles
  67. Review Article
  68. Bond performance of recycled coarse aggregate concrete with rebar under freeze–thaw environment: A review
  69. Retraction
  70. Retraction of “Convolutional neural network for UAV image processing and navigation in tree plantations based on deep learning”
  71. Special Issue: Dynamic Engineering and Control Methods for the Nonlinear Systems - Part II
  72. Improved nonlinear model predictive control with inequality constraints using particle filtering for nonlinear and highly coupled dynamical systems
  73. Anti-control of Hopf bifurcation for a chaotic system
  74. Special Issue: Decision and Control in Nonlinear Systems - Part I
  75. Addressing target loss and actuator saturation in visual servoing of multirotors: A nonrecursive augmented dynamics control approach
  76. Collaborative control of multi-manipulator systems in intelligent manufacturing based on event-triggered and adaptive strategy
  77. Greenhouse monitoring system integrating NB-IOT technology and a cloud service framework
  78. Special Issue: Unleashing the Power of AI and ML in Dynamical System Research
  79. Computational analysis of the Covid-19 model using the continuous Galerkin–Petrov scheme
  80. Special Issue: Nonlinear Analysis and Design of Communication Networks for IoT Applications - Part I
  81. Research on the role of multi-sensor system information fusion in improving hardware control accuracy of intelligent system
  82. Advanced integration of IoT and AI algorithms for comprehensive smart meter data analysis in smart grids
Downloaded on 8.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/nleng-2022-0369/html
Scroll to top button