期刊文献+

云环境下改进的非授权用户入侵行为分析及检测研究——以某高校学生专业倾向分析系统为例

Analysis and detection of intrusion behavior of non authorized users in cloud environment——Taking a college students' professional tendency analysis system as an example
下载PDF
导出
摘要 为改进关联规则模块对非授权用户入侵行为分析的效率,并提高可靠性,提出以多尺度理论对关联规则挖掘进行辅助,根据概念分层理论来确定数据尺度和数据尺度划分,提出尺度下推的关联规则挖掘算法。该算法利用从大尺度数据集中得到的知识及多尺度数据集之间的关系,推导小尺度数据集中隐含的知识,而不对小尺度数据集进行直接挖掘,因此具有较高的运行效率。将该算法运用于云计算下基于改进的关联分析的非授权用户入侵行为分析模型,能有效提高检测速度。 In order to improve the efficiency of the intrusion behavior analysis of unauthorized users by associate rule modules, the paper indicates that the theory of multi-scale could assist association rule data mining, it presents the definition of data-scale-partition and data-scale based on the theory of concept hierarchy, and provides the scaling-push association rules mining algorithm. This algorithm uses the knowledge generated from large-scale data sets and the relationship between multi-scale data sets to deduce the embedded knowledge of small-scale data sets, rather than directly conduct data mining towards small-scale data sets, so it has high operating efficiency. Based on the improved association analysis, if the algorithm could be used in the cloud computing intrusion behavior analysis model of non authorized users, the detection speed should be increased effectively.
作者 郑宇星 Zheng Yuxing(Anglo-Chinese College, Fuzhou Fujian 350018, China)
出处 《计算机时代》 2016年第10期25-28,共4页 Computer Era
基金 2015年福建省中青年教师教育科研项目"云计算平台下的数据挖掘技术在高职学生专业倾向性分析中的应用"(JA15872)
关键词 云计算 关联规则 多尺度 多尺度下推 概念分层 cloud computing association rules multi-scale multi-scale push concept hierarchy
  • 相关文献

参考文献6

二级参考文献39

  • 1柴立和.多尺度科学的研究进展[J].化学进展,2005,17(2):186-191. 被引量:24
  • 2孙庆先,方涛,郭达志.空间数据挖掘中的尺度转换研究[J].计算机工程与应用,2005,41(16):17-19. 被引量:8
  • 3孙庆先,李茂堂,路京选,郭达志,方涛.地理空间数据的尺度问题及其研究进展[J].地理与地理信息科学,2007,23(4):53-56. 被引量:26
  • 4刘波,潘久辉.基于频繁模式图的多维关联规则挖掘算法研究[J].电子学报,2007,35(8):1612-1616. 被引量:4
  • 5Santos N,Gummadi K P,Rodrigues R. Towards trusted cloud com-puting. Proceedings of the 2009 conference on Hot topics in cloudcomputing, San Diego, California. June 15,2009.
  • 6Garfinkel T, Haff B, Chow J, et al. Terra:a virtual machine-basedplatform for trusted computing. In : Proc Of SOSP^03 , 2003.
  • 7Nurmi D, Wolski R, Grzegorczyk C, et al. Eucalyptus: a technicalre-port on an elastic utility computing architecture linking your pro-grams to useful systems. Technical Report 2008-10, UCSB ComputerScience’ 2008.
  • 8http : //opennebula org/accessed on 19 November 2012. Open Nebula官网.
  • 9http ://docs, openstack. org/developer/nova/ (accessed on 19 Novem-ber 2012)Openstack 官网.
  • 10What is TCGcs Trusted Network Connect? www. interop, com/archive/pdfs/TCG. pdf (accessed on 19 November 2012).

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部