期刊文献+

数据流挖掘及其在持续审计中的可用性研究 被引量:3

Research on Data Stream Mining and Its Availability to Continuous Audit
下载PDF
导出
摘要 随着企业信息化程度的提高和互联网的普及,每天都会产生海量的实时数据,而数据流挖掘则为分析海量数据提供了一种新途径。数据流挖掘中的聚类、分类、离群点检测等算法的研究取得了进展,为在持续审计中应用数据流挖掘提供了可行性。本文提出的一种基于数据流挖掘的持续审计模型,克服了传统持续审计模型对审计端的存储能力要求高、占用大量硬件资源、联机分析时间长、对异常数据的发现滞后等缺点。 With the development of enterprise informatization and the popularity of the Internet, massive real-time data are being produced every day. Data stream mining provides one novel approach to analyzing massive real-time data. In this paper the sate-of-art in this field is presented, and its availability to continuous audit is discussed. Finally, based on data stream mining, one continuous audit model is proposed, which overcomes the disadvantages of huge storage capacity requirements, long-time online analysis and the delayed finding of abnormal data.
出处 《南京审计学院学报》 2011年第1期36-40,共5页 journal of nanjing audit university
基金 国家自然科学基金(70971067/G0112) 国家社会科学基金(10BGL016) 江苏省高校自然科学研究项目(09KJD520006)
关键词 数据流挖掘 持续审计 审计模型 聚类 分类 离群点检测 data stream mining continuous audit auditing model clustering classification outlier detection
  • 相关文献

参考文献21

  • 1Golab L, Ozsu M T. Issues in data stream management [ J]. ACM SIGMOD Record, 2003, 32:5- 14.
  • 2Marascu A, Masseglia F. Mining sequential patterns from temporal streaming data[ EB/OL]. [2010 - 09 - 09]. http ://www. di. uniba. it/- malerba/activities/mstd/.
  • 3Guha S, shra N, Moweani R, et al. Clustering data streams: theory and practice [ J ]. IEEE Transactions on Knowledge and Data Engineering, 2003, 15: 515- 528.
  • 4Aggarwal C, Han Jiawei, Wang Jianyong, et al. A frame- work for clustering evolving data streams [ C ]. Proc of Int Conf on Very Large Data Bases( VLDB03 ). San Francisco: Morgan Kaufmann Publishers,2003:81 - 92.
  • 5Zao Feng, Ester M, Qian Weining, et al. Density-based clustering over an evolving data stream with noise [ C ]. Proc of the SIAM Conference on Data Ming. Philadelphia: Society for Industrial and Applied Mathematics, 2006 : 328 - 339.
  • 6Cao Feng, Ester M, Qian Weining, et al. Density-based clustering over an evolving data stream with noise [ C ]. Proc of the SIAM Conference on Data Ming. Philadelphia: Society for Industrial and Applied Mathematics, 2006 : 328 - 339.
  • 7Wang Haixun, Fan Wei, Yu Philip S, et al. Mining concept-drifting data streams using ensemble classifiers [ C ]. Proc. of SIGKDD. New York : ACM, 2003:226 - 235.
  • 8Pedro D, Geoff H, Mining high-speed data streams [ C ]. Proc of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2000:71 - 80.
  • 9Huhen G, Spencer L, Domingos P. Mining time changing data streams[ C]. Proc. of the ACM Intl Conf on Knowledge Discovery and Data Mining. New York: ACM. 2001:97 - 106.
  • 10Hawkins D M. Identification of outliers[ M]. London : Chapman and Hall, 1980.

二级参考文献22

  • 1E Knorr, R Ng. Algorithms for mining distance-based outliers in large datasets [C]. The 24th Conf on VLDB, New York,NY, 1998
  • 2M M Breunig, H P Kreigel, R T Ng, et al. LOF: Identifying density-based local outliers [C]. The ACM SIGMOD, Dallas,TX, 2000
  • 3M Joshi, R Agarwal, V Kumar. Mining needles in a haystack:Classifying rare classes via two-phase rule induction [C]. The ACM SIGMOD Int'l Conf on Management of Data, Santa Barbara, CA, 2001
  • 4D Hawkins. Identification of Outliers [M]. London: Chapman and Hall, 1980. 1-45
  • 5S Guha, N Mishra, R Motwani, et al. Clustering data streams[C]. In: Proc of the Annual Syrup on Foundations of Computer Science, 2000. 359- 366. http://citeseer. ist. psu. edu/guha00clustering.html
  • 6Mishra, Adam Meyerson, Sudipto Guha, et al. Streaming-data algorithms for high-quality clustering [C]. In: Proc of IEEE Int'l Conf on Data Engineering, 2002. http://citeseer. ist. psu.edu/497671. html
  • 7J Han, M Kamber. Data Mining [M]. New York: Morgan Kaufmann, 2001. 1-321
  • 8S Robertson, E Siegel, M Miller, et al. Surveillance detection in high bandwidth environments [OL]. http://wwwl. cs.columbia.edu/ids/publications/SD-DiscexⅢ. pdf, 2003
  • 9M Mahoney. Network traffic anomaly detection based on packet bytes [C]. The 2003 ACM Symp on Applied Computing,Melbourne, Florida, 2003
  • 10T Johnson, I Kwok, R Ng. Fast computation of 2-dimensional depth contours [C]. The 4th Int'l Conf on Knowledge Discovery and Data Mining, New York, 1998

共引文献47

同被引文献25

  • 1王刚.关于联网审计的几个基本问题[J].审计月刊,2005(5):6-8. 被引量:5
  • 2李世新,邬晓岚.基于XBRL和Web服务的网络化审计取证模式研究[J].生产力研究,2006(11):253-254. 被引量:6
  • 3张天西,高锦萍.XBRL对审计的影响研究[J].当代财经,2007(6):101-104. 被引量:47
  • 4Kogan A, Sudit F E, Vasarhelyi A M . Continuous online auditing : a program of research [ J ]. Journal of Informa- tion Systems, 1999,13:87 - 103.
  • 5Alles M G, Kogan A, Vasarhelyi A M. Feasibility and e- conomics of continuous assurance, auditing[ J ]. Practice and Theory,2002,21:125 - 138.
  • 6Cheung S, Lindqvist U, Fong W M. Modeling muhistep cyber attacks for scenario recognition [ C ]. The Third DARPA Information Survivability Conference and Expo- sition (DISCEX III). Washington: IEEE computer Soci- ety Press,2003:284 - 292.
  • 7Woodroof J, Searcy D. Continuous audit model develop- ment and implementation within a debt covenant compli- ance domain [ J ]. International Journal of Accounting Information Systems,2001,2 : 169 - 191.
  • 8Dain O, Cuningham R. Building scenarios from a heter- ogeneous alert stream[ EB/OL]. [ 2011 - 02 - 03 ]. ht- tp://citeseerx, ist. psu. edu/viewdoc/download? doi = 10.1.1.58. 5277&rep = repl &type = pdf.
  • 9Kim J Sun, Kim M, Noth B N. A fuzzy expert system for network forensics [ C ]. The 2004 International Con- ference on Computational Science and Its Applications ( ICCSA 2004), Perngia, 2004 : 117 - 129.
  • 10Ning Peng, Xu Dingbang, Healey G C, etc. Building attack scenarios through integration of complementary a- lert correlation methods [ C ]. Proc. Of the 11 th Annual Network and Distributed System Security Symposium. NDSS, 2004:233 - 255.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部