期刊文献+

云计算环境下入侵疑似边界问题改进算法 被引量:4

Improved algorithm for intrusion suspected boundary problem in cloud computing environment
下载PDF
导出
摘要 传统的疑似边界问题处理算法一直存在边界确定结果不准确、误差较大的问题,为了提高网络安全性能,提出一种基于模糊网络阈值计算的云计算环境下入侵检测中疑似边界确定算法,分析了云计算环境下入侵种类及其检测原理,并确定其入侵形式;通过计算模糊网络阈值,确定云计算环境下入侵检测中疑似边界具体参数.仿真实验结果表明,采用改进算法进行疑似边界的确定,其结果精度及效率均优于传统算法,具有一定的优势. The traditional processing method for the suspected boundary problem always shows the inaccurate boundary determination results and larger errors. In order to improve the network security,a determination method for the suspected boundary in the intrusion detection in the cloud computing environment based on the fuzzy network threshold calculation was proposed. In addition, the intrusion types and detection principle in the cloud computing environment were analyzed,and the intrusion forms were determined.Through calculating the fuzzy network threshold,the specific parameters for the suspected boundary in the intrusion detection in the cloud computing environment were determined. The results of simulation experiment show that when the improved method is used for the determination of suspected boundary,the accuracy and efficiency of corresponding results are superior to those of results obtained with the traditional method,and the improved method has certain advantages.
作者 茹蓓 贺新征
出处 《沈阳工业大学学报》 EI CAS 北大核心 2017年第5期545-550,共6页 Journal of Shenyang University of Technology
基金 河南省科技厅科技攻关项目(172102210445) 河南省科技厅软科学研究资助项目(152400410345) 河南省教育厅资助项目(15A520093)
关键词 云计算环境 入侵检测 疑似边界 阈值计算 模糊网络 边界确定 网络安全性 入侵形式 cloud computing environment intrusion detection suspected boundary threshold calculation fuzzy network boundary determination network security intrusion form
  • 相关文献

参考文献11

二级参考文献127

共引文献98

同被引文献30

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部