期刊文献+

多层物联网下的非法信息快速定位方法研究

Study on Illegal Information Fast Positioning Method Under Multilayer Interment of Things
下载PDF
导出
摘要 在对多层物联网下非法信息进行快速定位的过程中,容易出现实际问题中用户的行为模式存在多样性与不可预知性的情况,导致传统方法由于采用提前设定模式进行学习,无法有效实现非法信息的快速定位,提出一种基于K-均值聚类的多层物联网下非法信息快速定位方法,分析了多层物联网的结构,随机选择若干数据点作为初始簇中心,将集合中所有数据点分配至和其最近的簇中心所在的类簇中,形成初始分布。分配完成后对各簇中心进行更新,不断进行数据划分,直至簇中心不再发生改变,聚类准则函数收敛。通过评价指标获取合理的聚类结果,从而完成多层物联网下非法信息的快速定位。仿真实验表明,所提方法具有很高的准确性及高效性。 Under the multilayered Iot illegal information for rapid positioning in the process, it's easy to have a real problem existed in the user's behavior patterns of diversity and unpredictability, lead to the traditional methods with early set model for learning, unable to effectively achieve rapid positioning of illegal information, proposes a k-means clustering are based on multilayer iot of illegal information fast positioning method, analyzes the multi-layer structure of the Internet of things, random number of data points as the initial cluster centers, the collection of all data points assigned to and its nearest cluster center of the cluster, the formation of the initial distribution.Assigned to update of each cluster center, after the completion of ongoing data partitioning, until the cluster center no longer change, clustering convergence criterion function.Through the evaluation index to obtain reasonable clustering results, so as to complete fast localization of multilayer illegal information under the Internet of things.The simulation results show that the proposed method has high accuracy and high efficiency.
作者 曹建春 杜鹃
出处 《科技通报》 北大核心 2015年第9期200-203,共4页 Bulletin of Science and Technology
关键词 物联网 非法信息 快速定位 the Internet of things illegal information rapid positioning
  • 相关文献

参考文献5

二级参考文献40

  • 1高能,冯登国,向继.一种基于数据挖掘的拒绝服务攻击检测技术[J].计算机学报,2006,29(6):944-951. 被引量:44
  • 2ANDERSON J P.Computer Security Threat Monitoring and Surveillance[R].James P Anderson Co,Fort Washington,Pennsylvania,1980.
  • 3PORTNOY L,ESKIN E,STOLFO S J.Intrusion detection with unlabeled data using clustering[A].Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA2001)[C].Philadelphia,2001.5-8.
  • 4JIANG S Y,SONG X,WANG H,et al.A clustering-based method for unsupervised intrusion detections[J].Pattern Recognition Letters,2006,27(7):802-810.
  • 5ESKIN E,ARNOLD A,PRERAU M,et al.A geometric framework for unsupervised anomaly detection:detecting intrusions in unlabeled data[A].Applications of Data Mining in Computer Security[C].Boston,2002.78-99.
  • 6OLDMEADOW J,RAVINUTALA S,LECKIE C.Adaptive clustering for network intrusion detection[A].Advances in Knowledge Discovery and Data Mining[C].Heidelberg,2004.255-259.
  • 7LEUNG K,LECKIE C.Unsupervised anomaly detection in network intrusion detection using clusters[A].Proceedings of the Twenty-Eighth Australasian Computer Science Conference[C].Sydney,2005.333-342.
  • 8ZANERO S,SAVARESI S M.Unsupervised learning techniques for an intrusion detection system[A].Proceedings of the 2004 ACM Symposium on Applied Computing[C].New York,2004.412-419.
  • 9LUO M,WANG L,ZHANG H,et al.A research on intrusion detection based on unsupervised clustering and support vector machine[A].Information and Communications Security[C].Heidelberg,2003.325-336.
  • 10GUHA S,RASTOGI R,SHIM S.CURE:an efficient clustering algorithm for large databases[A].Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data[C].New York,1998.73-84.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部