期刊文献+

基于马尔科夫聚类的通信网络敏感信息监测 被引量:2

Automatic monitoring method of sensitive information in communication network based on Markov clustering
下载PDF
导出
摘要 通信网络敏感信息自动监测是识别网络异常行为的关键所在。针对目前方法难以有效区分通信网络异常行为与正常行为之间关系的问题,提出了一种基于马尔科夫聚类的网络敏感信息自动监测方法。该方法首先基于网络流信息构建邻接矩阵,然后利用马尔科夫聚类。利用聚类前后簇数和核心结构节点数目的变化特征,自动监测通信网络的敏感信息。实验结果表明,该方法能够有效监测出通信网络的敏感信息,且具有较高的识别准确率。 Automatic monitoring of sensitive information in communication network is the key to identify abnormal network behavior. Aiming at the problem that it is difficult to distinguish the relationship between abnormal behavior and normal behavior of communication network effectively by current methods,an automatic monitoring method of network sensitive information based on Markov clustering is proposed. This method first constructs the adjacency matrix based on network flow information,and then uses Markov clustering. The sensitive information of communication network is automatically monitored by using the changing characteristics of cluster number and core structure node number before and after clustering. The experimental results show that the method can effectively monitor the sensitive information of the communication network,and has high recognition accuracy.
作者 陈美红 CHEN Mei-hong(Shanghai Urban Construction Vocational College,Shanghai 201415,China)
出处 《信息技术》 2019年第5期101-105,共5页 Information Technology
关键词 通信网络 敏感信息监测 马尔科夫聚类 网络流连接 communication network sensitive information monitoring Markov clustering network flow connection
  • 相关文献

参考文献7

二级参考文献51

  • 1周振柳,郑安刚,邹和平.电力二次系统安全防护综合仿真试验床研究[J].系统仿真学报,2015,27(6):1221-1226. 被引量:3
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3林梅琴,李志蜀,袁小铃,周密,王雪松,童铭.分布式拒绝服务攻击及防范研究[J].计算机应用研究,2006,23(8):136-138. 被引量:11
  • 4陈明奇.分布式拒绝服务攻击处理实例分析[J].信息网络安全,2007(6):36-37. 被引量:11
  • 5Adam A, Rivlin E, Shimshoni I, et al. Robust Real-Time UnusualEvent Detection Using Multiple Fixed-Location Monitors [J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2008, 30(3) :555-560.
  • 6Xiang Tao, Gong Shaogang. Incremental and Adaptive Abnormal Behaviour Detection[J]. Computer Vision and Image Understand- ing, 2008,111 ( 1 ) : 59-73.
  • 7Zhang Dongping, Peng Huailiang, Yu Haibin, et al. Crowd Abnor- mal Behavior Detection Based on Machine Learning [J]. Informa- tion Technology Journal, 2013,12 (6) : 1199-1205.
  • 8Bing Sun, Yang Wang, Jacob Banda. Gait Characteristic Analysis and Identification Based on the iPhone's Accelerometer and Gy- rometer[J]. Sensors. 2014,14:17037-17054.
  • 9Trzaskowski B, Jedrzejczak W W, Pilka E, et al. Automatic Re moval of Souomotor Waves fi'om Auditory Brainstem Responses [J]. Computers in Biology and Medicine, 2013,43 : 524-532.
  • 10Tang K L, Wang Y, Liu H, et al. Design and Implementation of Push Notification System Based on the MQTT Protocol [ C ]//inter- national Conf on Information Science and Computer Applications, 2013:116-119.

共引文献85

同被引文献25

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部