期刊文献+

基于post关键字编译法的网络异常数据挖掘软件设计 被引量:1

Design of Network Exception Data Mining Software Based on Post Keyword Compile Method
在线阅读 下载PDF
导出
摘要 在大数据背景下进行网络异常数据挖掘,提高网络的安全性,提出基于post关键字编译法的网络异常数据挖掘方法,并在嵌入式模块中进行软件开发设计。建立网络异常数据的非线性结构重组模型,采用交叉编译方法进行网络异常数据的关键字特征提取,建立网络异常数据关键字的语义本体模型,采用语义关联映射方法进行网络异常数据的语义特征检测和信息挖掘,构建反映网络异常数据存档信息归类的语义本体模型,通过自相关特征匹配实现网络异常数据的属性检测,结合post关键字编译法方法进行网络异常数据挖掘优化。在嵌入式Linux环境下实现网络异常数据挖掘的软件设计。仿真结果表明,采用该方法进行网络异常数据挖掘的准确性较高,实时性较好,提高了网络异常检测能力。 Under the background of big data,the network abnormal data mining is carried out to improve the security of the network.A network abnormal data mining method based on post keyword compilation method is proposed,and the software development and design are carried out in the embedded module.The nonlinear structure reorganization model of network abnormal data is established,the keyword feature extraction of network abnormal data is carried out by cross-compilation method,the semantic ontology model of network abnormal data keyword is established,the semantic feature detection and information mining of network abnormal data are carried out by using semantic association mapping method,and the semantic ontology model reflecting the classification of archived information of network abnormal data is constructed.The attribute detection of network abnormal data is realized by autocorrelation feature matching,and the optimization of network abnormal data mining is carried out by combining post keyword compilation method.The software design of network abnormal data mining is realized in embedded Linux environment.The simulation results show that the method has high accuracy and real-time performance,and improves the ability of network anoanomaly detection.
作者 焦锐丽 郑武强 李贤 JIAO Rui-li;ZHENG Wu-qiang;LI Xian(Henan Vocational College Of Water Conservancy and Environment,Henan Zhengzhou 450008,China;Zhengzhou Information Engineering Vocational College,Henan Zhengzhou 450008,China)
出处 《新一代信息技术》 2019年第21期45-50,共6页 New Generation of Information Technology
基金 河南水利与环境职业学院(项目编号:KY1828)。
关键词 post关键字 编译 网络异常数据 挖掘 软件 post keyword compilation network exception data mining software
  • 相关文献

参考文献10

二级参考文献99

  • 1李洋,方滨兴,郭莉,田志宏.基于主动学习和TCM-KNN方法的有指导入侵检测技术[J].计算机学报,2007,30(8):1464-1473. 被引量:31
  • 2SCARFONE K,MELL P. Guide to intrusion detection and prevention systems[M].Gaithersburg,MD,USA:NIST Special Publication,2007.9.
  • 3TJHAI G,PAPADAKI M,FURNELL S. The problem of false alarms:evaluation with snort and DARPA 1999 dataset[A].Berlin:Springer-Verlag,2008.139-150.
  • 4ABIMBOLA A A,MUNOZ J M,BUCHANAN W J. Investigating false positive reduction in http via procedure analysis[A].Los Alamitos,CA,USA:IEEE Computer Society,2006.87-93.
  • 5TIAN Zhihong,ZHANG Weizhe,YE Jianwei. Reduction of false positives in intrusion detection via adaptive alert classifier[A].Piscataway,NJ USA:IEEE,2008.1599-1602.
  • 6ALSHAMMARI R,SONAMTHIANG S,TEIMOURI M. Using neuro-fuzzy approach to reduce false positive alerts[A].Los Alamitos,CA,USA:IEEE Computer Society,2007.345-349.
  • 7SPATHOULAS G P,KATSIKAS S K. Reducing false positives in intrusion detection systems[J].Computers and Security,2010,(01):35-44.
  • 8NYCHIS G,SEKAR V,ANDERSEN D G. An empirical evaluation of entropy-based traffic anomaly detection[A].New York,USA:ACM,2008.151-156.
  • 9MISRA S,KRISHNA P V,SARITHA V.LACAV:an energyefficient channel assignment mechanism for vehicular Ad Hoc networks[J].Journal of supercomputing,2012,62(3):1241-1262.
  • 10BANERJEE I,CHANAK P,RAHAMAN H,et al.Effective fault detection and routing scheme for wireless sensor networks[J].Computers&electrical engineering,2014,40(2):291-306.

共引文献241

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部