期刊文献+

半结构化时间序列中异常数据挖掘算法仿真 被引量:1

Simulation of Anomaly Data Mining Algorithm in Semi-Structured Time Series
下载PDF
导出
摘要 在复杂多变网络环境下,传统算法不能有效地挖掘出异常数据,准确率较低,严重威胁网络正常数据安全。提出一种基于半结构化时间序列的异常数据挖掘算法。首先通过临近算法对半结构化时间序列的数据进行特征提取,整合为特征数据序列并做信息熵值计算,获得数据熵值的空间信号,其次采用线性斜率算法将空间信号做降维处理,并使用分段聚合符号变换对降维后的信号做符号转换,识别出正常数据与异常数据,最后采用频繁项集算法挖掘出异常数据。实验表明,半结构化时间序列方法计算简单,能够有效挖掘出异常数据,准确率较高,具有良好的鲁棒性,实现高效挖掘异常数据,保障网络正常数据的安全。 In complex and changeable network environment, the traditional algorithm can’t effectively mine the abnormal data, resulting in low accuracy. This paper focuses on an abnormal data mining algorithm based on semi-structured time series. Firstly, the data of semi-structured time series was extracted by proximity algorithm, which was integrated into feature data series. Then, the entropy value of information was calculated to obtain the spatial signal of data entropy. Secondly, the linear slope algorithm was used to reduce the dimension of space signal and the piecewise aggregation symbol transform was used to perform the symbol conversion on the signal after the dimension reduction. Moreover, the normal data and abnormal data could be found. Finally, the frequent item sets algorithm was used to mine the abnormal data. Simulation results show that the semi-structured time series method is simple which can effectively mine abnormal data with high accuracy and good robustness. Thus, this method can efficiently mine abnormal data and ensure the security of network normal data.
作者 杨柳 YANG Liu(Chongqing Nanfang Translators College,SISU,Chongqing 401120,China)
出处 《计算机仿真》 北大核心 2020年第10期230-234,共5页 Computer Simulation
关键词 半结构化 时间序列 异常数据 数据挖掘算法 信息熵值 Semi-structured Time series Abnormal data Data mining algorithm Information entropy value
  • 相关文献

参考文献12

二级参考文献93

  • 1周晓云,孙志挥,张柏礼,杨宜东.高维类别属性数据流离群点快速检测算法[J].软件学报,2007,18(4):933-942. 被引量:21
  • 2张建业,潘泉,张鹏,梁建海.基于斜率表示的时间序列相似性度量方法[J].模式识别与人工智能,2007,20(2):271-274. 被引量:36
  • 3曹冬磊,曹建农,金蓓弘.一种无线传感器网络中事件区域检测的容错算法[J].计算机学报,2007,30(10):1770-1776. 被引量:29
  • 4Ding Jie, Wang Lei, Shen DEan, et al. An anomaly detection system on big data[ J]. Natural Science Journal of Hainan University, 2015(1).
  • 5KDD Cup99 [ EB/OL]. http ://kdd. its. uci. edu/.
  • 6Kriegel H P, Schubert M, Zimek A. Angle-based outlier detection in high-dimensional data[ C ]//Proe of the 14th ACM SiGKDD Interna- tional Conference on Knowledge Discovery and Data Mining. 2008: 444-452.
  • 7Kim G, Lee S, Kim S. A novel hybrid intrusion detection method in- tegrating anomaly detection with misuse detection [ J ]. Expert Sys- tems with Applications, 2014, 41 (4) :1690-1700.
  • 8Feldman D, Schmidt M, Sohler C. Turning big data into tiny data: constant-size coresets for K-means, PCA and projective clustering [ C]// Procs of the 24th Annum ACM-SIAM Symposium on Discrete Algorithms. New York : ACM Press, 2013 : 1434-1453.
  • 9Yu Li, Lan Zhiling. A scalable, non-parametric anomaly detection framework for Hadoop [ C ]// Proc of ACM Cloud and Autonomic Computing Conference. New York: ACM Press, 2013.
  • 10Hart Jiawei, Kamber M, Pei Jian. Data mining: concepts and tech- niques [ M]. 3rd ed. San Francisco: Morgan Kanfmann, 2011.

共引文献246

同被引文献15

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部