期刊文献+

User abnormal behavior analysis based on neural network clustering

User abnormal behavior analysis based on neural network clustering
原文传递
导出
摘要 It is the premise of accessing and controlling cloud environment to establish the mutual trust relationship between users and clouds. How to identify the credible degree of the user identity and behavior becomes the core problem? This paper proposes a user abnormal behavior analysis method based on neural network clustering to resolve the problems of over-fitting and flooding the feature information, which exists in the process of traditional clustering analysis and calculating similarity. Firstly, singular value decomposition (SVD) is applied to reduce dimension and de-noise for massive data, where map-reduce parallel processing is used to accelerate the computation speed, and neural network model is used for softening points. Secondly, information entropy is added to hidden layer of neural network model to calculate the weight of each attribute. Finally, weight factor is used to calculate the similarity to make the cluster more accuracy. For the problem of analyzing the mobile cloud user behaviors, the experimental results show that the scheme has higher detection speed (DS) and clustering accuracy than traditional schemes. The proposed method is more suitable for the mobile cloud environment. It is the premise of accessing and controlling cloud environment to establish the mutual trust relationship between users and clouds. How to identify the credible degree of the user identity and behavior becomes the core problem? This paper proposes a user abnormal behavior analysis method based on neural network clustering to resolve the problems of over-fitting and flooding the feature information, which exists in the process of traditional clustering analysis and calculating similarity. Firstly, singular value decomposition (SVD) is applied to reduce dimension and de-noise for massive data, where map-reduce parallel processing is used to accelerate the computation speed, and neural network model is used for softening points. Secondly, information entropy is added to hidden layer of neural network model to calculate the weight of each attribute. Finally, weight factor is used to calculate the similarity to make the cluster more accuracy. For the problem of analyzing the mobile cloud user behaviors, the experimental results show that the scheme has higher detection speed (DS) and clustering accuracy than traditional schemes. The proposed method is more suitable for the mobile cloud environment.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期29-36,44,共9页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (U1404611, U1204614, 61370221) in part by Program for Science& Technology Innovative Research Team in University of Henan Province (14IRTSTHN021) in part by the Program for Science & Technology Innovation Talents in the University of Henan Province (14HASTIT045, 16HASTIT035) in part by Henan science and technology innovation outstanding talent (164200510007)
关键词 anomaly analysis information security singular value decomposition (SVD) neural network information entropy anomaly analysis, information security, singular value decomposition (SVD), neural network, information entropy
  • 相关文献

参考文献20

  • 1Marotta M A, Faganello L R, Schimuneck M A K, et al. Managing mobile cloud computing considering objective and subjective perspectives. Computer Networks, 2015, 93(3): 531-542.
  • 2Lu Y, Xi X F, Hua Z, et al. An abnormal user behaviour detection method based on partially labelled data. Computer Modelling and New Technologies, 2014, 18(6): 132-141.
  • 3Gu X X, Cui J R, Zhn Q. Abnormal crowd behavior detection by using the particle entropy. Optik: International Journal for Light and Electron Optics, 2014, 125(14): 3428-3433.
  • 4Badase P S, Deshbhratar G P, Bhagat A P. Classification and analysis of clustering algorithms for large datasets. Proceedings of the 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS'I5), Mar 19-20, 2015, Coimbatore, India. Piscataway, NJ, USA: IEEE, 2015: 5p.
  • 5Bavaud F. Euclidean distances, sott and spectral clustering on weighted graphs. Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases (PKDD'10), Sept 20-24, 2010, Barcelona, Spain. LNCS 6321. Berlin, Germany: Springer-Vertag, 2010: 103-118.
  • 6Ayeldeen H, Hassanien A E, Fahmy A A. Lexical similarity using fuzzy Euclidean distance. Proceedings of the IEEE International Conference on Engineering and Technology (ICET'14), Apr 19-20, 2014, Cairo, Egypt. Piscataway, NJ, USA: IEEE, 2014: 6p.
  • 7Celebi M E, Kingravi H A, Vela P A. A comparative study of efficient initialization methods for the k-means clustering algorithm. Expert Systems with Applications, 2013, 40( 1): 200-210.
  • 8Tan X B, Xi H S. Hidden semi-Markov model for anomaly detection. Applied Mathematics and Computation, 2008, 205(2): 562-567.
  • 9Yang M S, Tian Y C. Bias-correction fuzzy clustering algorithms. Information Sciences, 2015, 309(1): 138-162.
  • 10Li H, Wu Q X. Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection. Proceedings of the 2013 International Conference on Information Science and Cloud Computing Companion (ISCC-C'13), Dec 7-8, 2013, Guangzhou, China. Piscataway, N J, USA: IEEE, 2013:799-805.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部