期刊文献+

通信电子档案非自体入侵多方协作取证方法研究

Research on Multi-party Cooperative Forensics Method of Non-self-intrusion in Communication Electronic Archives
下载PDF
导出
摘要 通信电子档案容易受到外界入侵导致信息泄漏,需要对入侵信息进行多方协作取证,提出一种基于关联规则特征提取的通信电子档案非自体入侵多方协作取证方法,构建通信电子档案非自体入侵的信息检测模型,采用最大似然拟合方法进行通信电子档案非自体入侵的信号模型构建,建立通信电子档案非自体入侵的码元传输信道分布模型,提取通信电子档案流量序列的统计特征量,采用码元包络幅值检测方法进行通信电子档案非自体入侵多方协作取证,实现入侵的多方协作检测.仿真结果表明,采用该方法进行通信电子档案非自体入侵多方协作取证的准确性较高,入侵检测概率较好,提高了通信电子档案的安全性. Communication electronic archives are vulnerable to external intrusion resulting in information leakage,Therefore,it is necessary to carry out multi-party cooperative forensics to obtain intrusion information.A multi-party cooperative forensics method based on association rule feature extraction for non-self-invading communication electronic archives is proposed.The information detection model of non-self-intrusion of communication electronic archives was constructed.The signal model of non-self-intrusion of communication electronic archives was constructed using the maximum likelihood fitting method,and the symbol transmission channel distribution model of non-self-intrusion of communication electronic archives was established.The statistical characteristic of the traffic sequence of communication electronic archives was extracted,and the detection method of symbol envelope amplitude was used to detect the multiparty cooperation of the non-self-intrusion of communication electronic archives in order to realize the multi-party cooperation detection of the intrusion.The simulation results show that the accuracy and detection probability of non-selfinvading multi-party cooperative forensics of communication electronic archives are high,and the security of communication electronic archives is improved.
作者 初雪 CHU Xue(Qilu Normal University,Jinan 250200,China)
机构地区 齐鲁师范学院
出处 《内蒙古民族大学学报(自然科学版)》 2019年第6期468-473,共6页 Journal of Inner Mongolia Minzu University:Natural Sciences
基金 山东省高等学校科技计划项目(J16LN70)
关键词 通信电子档案 非自体入侵 多方协作取证 检测 Communication electronic file Non-self-intrusion Multi-party cooperative forensics Detection
  • 相关文献

参考文献9

二级参考文献57

  • 1毕小龙,王洪跃,司风琪,徐治皋.基于趋势提取的稳态检测方法[J].动力工程,2006,26(4):503-506. 被引量:17
  • 2Zhu ZhiBo,Song ZhiHuan. Fault Diagnosis Based on Imbal-ance Modified Kernel Fisher Discriminant Analysis [ J ].Chemical Engineering Research and Design, 2010, 88 (8):936-951.
  • 3Tavallaee M,Stakhanova N,Ghorbani A A. Toward CredibleEvaluation of Anomaly-Based Intrusion-Detection Methods[J]. IEEE Transactions on Systems,Man,and Cybernetics-Part C: Applications and Reviews, 2010 ,40(5): 516-524.
  • 4Mazurowski M A,Habas P A, Zurada J M, et al. TrainingNeural Network Classifiers for Medical Decision Making:The Effects of Imbalanced Datasets on Classification Per-formance[J]. Neural Networks,2008,21(2-3) :427-436.
  • 5Kubat M, Holte R C, Matwin S. Machine Learning for theDetection of Oil Spills in Satellite Radar Images[J]. MachineLearning, 1998, 30(2-3):195-215.
  • 6Weiss G M. Mining with Rarity: A Unifying Framework[J].Newsletter of the ACM Special Interest Group on KnowledgeDiscovery and Data Mining, 2004,6(1) :7-19.
  • 7Weiss G M, Foster P. Learning When Training Data Are Cost-ly: The Effect of Class Distribution on Tree Induction [J]. Jour-nal of Artificial Intelligence Research, 2003, 19(10) :315-354.
  • 8Fawcett T. Roc Graphs: Notes and Practical Considerationsfor Researchers[R]. HP Labs Tech Report, HPL-2003-4 ,2003.
  • 9Chawla N V,Bowyer K W,Hall L O,et al. Smote:SyntheticMinority Over-Sampling Technique[J]. Journal of ArtificialIntelligence Research, 2002,16(3) :321-357.
  • 10Chen Leichen,Cai Zhihua,Chen Lu,et al. A Novel Differenti-al Evolution-Clustering Hybrid Resampling Algorithm on Im-balanced Datasets[C]//Proc of the 3rd International Confer-ence on Knowledge Discovery and Data Mining, 2010 : 81-85.

共引文献167

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部