期刊文献+

一种多协议网络日志二次聚类方法研究

Method of multi-protocol network log two-step clustering
下载PDF
导出
摘要 为了处理网络日志规模过大及其相关问题,并为后期日志分析提供简洁的数据源,提出一种多协议网络日志二次聚类方法。该方法采用划分网格的方式把网络日志进行网格内初次聚类,然后再依据相似度判断对初次聚类簇进行二次聚类,最后输出聚类后的日志记录及一些稀疏数据和孤立点数据。经实验测试证明,在不破坏网络日志的完整性和准确性,且不影响用户正常网络访问的前提下,该方法日志规模压缩效果显著,时间复杂度低以及能够处理实际的动态数据,实现增量式聚类。 To deal with large scale of Web log and related issues,and to provide brief data sources for the later log analysis,this paper proposed a method multi-protocol network log two-step clustering,which ploted every log into data grid and first clustering in the grid.Then according to similarity judgment,made the initial cluster grid secondary clustering.Finally output clustered log,some sparse data and outlier data.Through the test experiment,in the premise of ensuring the completeness and accuracy of log,and without affect the normal user network communication,the method can effectively compress log storage,reduce the time complexity and deal with actual dynamic data and realize incremental clustering.
作者 杨杰
出处 《计算机应用研究》 CSCD 北大核心 2012年第10期3929-3931,共3页 Application Research of Computers
基金 湖南省自然科学基金资助项目(11JJ6056)
关键词 网络日志分析 网格聚类 二次聚类 增量式聚类 Web log analysis grid-based clustering two-step clustering incremental clustering
  • 相关文献

参考文献11

  • 1CAO Sha-sha , KE Zong-wu, CHEN Nian-sheng. Research of QoS routing technology for wireless multimedia sensor network [ C J IIProc of ISECS International Colloquium on Computing, Communication, Control, and Management. 2009 :334-337.
  • 2ZHANG Xia, YU Hong-yi,ZHOU Gang. Bandwidth efficient collabora- tive quality of service routing for real-time flow in wireless multimedia sensor networks] C] IIProc of Services Computing Conference. 2010: 509-515.
  • 3UN Wen-zhong,SONG Ying-xiong, CHEN Min. A load-balanced and energy-aware routing metric for wireless multimedia sensor networks [ C J IIProc of the 3rd International Conference on Wireless, Mobile and Multimedia Networks. 2010:21-24.
  • 4MEDJIAH S, AHMED T, KRIEF F. AGEM: adaptive greedy-compass energy-aware multipath routing protocol for WMSNs [ C ] IIProc of the 7th IEEE Consumer Communications and Networking Conference. 2010: 1-6.
  • 5MOHAJERZADEH A H, Y AGHMAEE M H, MONSEFI R. A QoS based data dissemination protocol for wireless multimedia sensor networks] C] I IProc of the 3rd International Workshop on Advanced Computational Intelligence. 2010 :670-675.
  • 6HOSSEIN M A, HOSSEIN Y M, NAJMI TN, et at. MREEP: a QoS based routing protocol for wireless multimedia sensor networks [ C ] II Proc of the 19th Iranian Conference on Electrical Engineering (ICEE). 2011 : 1-6.
  • 7VITHY A G, VINA YAGASUNDARAM B. Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on Wireless Multimedia Sensor Network [ C] IIProc of International Conference on Recent Trends in Information Technology. 2011 :444449.
  • 8赵小敏.基于日志的计算机取证技术的研究及系统设计与实现[D].浙江:浙江工业大学信息工程系,2008.
  • 9PETER K K L, HSU W J, YI P. Performance evaluation of efficient and reliable routing protocols for fixed-power sensor networks [J]. IEEE Trans on Wireless Communications, 2009,8 ( 5 ) : 1102- 1109.
  • 10刘必雄,杨泽明,吴焕,许榕生.基于集群的多源日志综合审计系统[J].计算机应用,2008,28(2):541-544. 被引量:6

二级参考文献21

  • 1黄艺海,胡君.日志审计系统设计与实现[J].计算机工程,2006,32(22):67-68. 被引量:17
  • 2王新昌,杨艳,刘育楠.一种基于局域网络监控日志的安全审计系统[J].计算机应用,2007,27(2):292-294. 被引量:14
  • 3Seiden, KF, Melanson JP. The auditing facility for a VMM security kernel. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 262-277.
  • 4Simone FH. IT-Security and Privacy. Berlin: Springer-Verlag, 2001. 35-104.
  • 5Bishop M. A model of security monitoring. In: IEEE 5th Annual Computer Security Applications Conf. New York: IEEE Computer Society Press, 1990. 46-52.
  • 6National Computer Security Center. A guide to understanding audit in trusted systems, Version 2. Technical Report, NCSC-TG-001, Fort Meade: National Computer Security Center, 1988.
  • 7Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1987. 184-194.
  • 8Ozsu MT, Valduriez P. Principle of Distributed Database Systems. 2nd ed., Upper Saddle River: Prentice Hall, 1989. 25-51.
  • 9Denning DE, Lunt TF. A multilevel relational data model. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 220-234.
  • 10Woodcock J, Davies J. Using Z. Upper Saddle River: Prentice Hall, 1996.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部