期刊文献+

数据挖掘在用户行为可信研究中的应用 被引量:2

Application of Data Mining in Behavior Trust Research
原文传递
导出
摘要 用户行为的可信性研究已成为当前可信计算中的一个重要内容。但是,用户行为的复杂性使得用户行为的可信研究变得非常困难。针对该问题,文中采用数据挖掘算法分析并发现用户正常行为模式和异常状态下的特征规则,并以之对用户历史行为数据进行检测,反映出用户行为的可信性,为系统安全决策提供客观的参考依据,有利于系统加强对不可信用户的安全监控,提高系统安全防范能力。 The study of user behavior trust has now become an important element in the trusted computing. However, the complexity of user behavior makes the research of its trust even more difficult. To address the problem, this paper analyses and classifies the normal user behavior patterns, and abstracts the characteristic rules in abnormal behavior by data mining algorithms. Then the historic behaviors of users are verified according to the patterns and the rules, thus to reflect the credibility of user behavior provide objective information for security decision of the system, help strengthen the monitoring of suspect users, and improve system security.
出处 《信息安全与通信保密》 2009年第8期243-245,249,共4页 Information Security and Communications Privacy
基金 现代通信国家重点实验室基金资助项目(9140C1101050706) 广西信息与通讯技术重点实验室基金资助项目(No.10908).
关键词 可信计算 数据挖掘 行为可信 trust computing data mining behavior trust
  • 相关文献

参考文献9

  • 1林闯,王元卓,田立勤.可信网络的发展及其面对的技术挑战[J].中兴通讯技术,2008,14(1):13-16. 被引量:16
  • 2张润莲,武小年,周胜源,董小社.一种基于实体行为风险评估的信任模型[J].计算机学报,2009,32(4):688-698. 被引量:37
  • 3The Trusted Computing Group, TCG Specification Archite- cture Overview[EB/OL]. (2007-8-2)[2008-6-26].http://www.trustedcomputinggroup.org/resources/tcg_architecture_over_view_version_14/.
  • 4Pearson S. Trusted Computing Platform, the next Security Solution[R]. UK:HP Laboratories, 2002.
  • 5林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 6Srivat sa M, Xiong L, Liu L. Trust Guard: Countering vulnerabilities in reputation management for decentralized overlay networks[C]. USA:ACM, 2005:422-431.
  • 7Kamber, Micheline. Data mining: concepts and techniques[M]. USA: Morgan Kaufmann Publishers, 2001.
  • 8Kaufman L, Rousseeuw P J. Finding Groups in Data: An Introduction to Cluster Analysis[M]. New York:John Wiley & Sons, 1990.
  • 9Savasere A, Omiecinsky E, Navathe S. An efficient algorithm for mining association rules in Large databases[C], USA:Morgan Kaufmann Publishers Ine, 1995:432-443.

二级参考文献39

共引文献292

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部