期刊文献+

基于K-means聚类算法的章程文本数据安全智能检验分析系统设计 被引量:5

Design of intelligent inspection system for charter text data security based on K-means clustering algorithm
原文传递
导出
摘要 针对现有章程文本数据安全智能检验系统存在的检验精度低、运行性能差的问题,利用K-means聚类算法,从硬件和软件两个方面实现章程文本数据安全智能检验分析系统的优化设计。改装检验分析系统的安全通信网络和智能触摸屏显示单元,扩大系统存储器的存储空间,连接并调试系统的供电电路。在硬件系统的支持下,挖掘章程文本数据,利用K-means聚类算法处理章程文本数据,根据安全漏洞及攻击的智能检测结果,计算当前章程文本数据的风险值,进而得出最终的安全检验结果。经过系统测试实验得出结论:设计系统的平均误检率低于3%,且运行过程中占用的CPU与内存空间小于总运行空间的10%,检验分析的精度最高可达98.52%,即在检测精度和运行性能方面均满足设计要求。 Aiming at the problems of low inspection accuracy and poor operation performance of the existing intelligent inspection system for charter text data security, the K-means clustering algorithm is used to realize the optimal design of the intelligent inspection system for charter text data security from two aspects of hardware and software. Refit the safety communication network and intelligent touch screen display unit, expand the storage space of the system memory, and connect and debug the power supply circuit of the system. With the support of the hardware system, mine the Charter text data, use the K-means clustering algorithm to process the Charter text data, calculate the risk value of the current charter text data according to the intelligent detection results of security vulnerabilities and attacks, and then obtain the final security inspection results. Through the system test experiment, it is concluded that the average false detection rate of the designed system is less than 3%, and the CPU and memory space occupied in the operation process is less than 10% of the total operation space. The accuracy of inspection and analysis can reach 98.52%, that is, it meets the design requirements in terms of detection accuracy and operation performance.
作者 王喆 WANG Zhe(Shaanxi Energy Institute,Xianyang,Shaanxi 712000,China)
出处 《自动化与仪器仪表》 2022年第3期96-100,共5页 Automation & Instrumentation
基金 陕西省职业技术教育学会2021年度规划课题“高等职业院校治理能力现代化研究——基于“双高计划”建设A档10所院校章程文本的分析”(2021SZXGH04)。
关键词 K-MEANS聚类算法 章程文本数据 数据安全检测 智能检验分析系统 K-means clustering algorithm text data of articles of association data security detection intelligent detection system
  • 相关文献

参考文献15

二级参考文献127

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2唐晓春,梁梅青.登陆广东的热带气旋及其产生的灾害链[J].灾害学,2006,21(3):47-53. 被引量:19
  • 3余慧.基于USBKey技术实现电子钱包的安全应用解决方案[J].湖北教育学院学报,2007,24(2):71-73. 被引量:3
  • 4ALBERTSC,DOROFEEA.信息安全管理[M].北京:清华大学出版社,2003.
  • 5赵战生,谢宗晓.信息安全风险评估概念、方法与实践[M].北京:中国标准出版社,2007.
  • 6KARABACAK B, SOGUKPINAR I. ISRAM : information secu- rity risk analysis method [ J]. Computers & Security, 2005, 24: 147-159.
  • 7ISO/IEC 27005 : 2011 Information technology-Security tech- niques-Information security risk management [ EB/OL 1. ht- tp : //www. iso27001 security, com/html/27005, html.
  • 8NIST. NIST Special Publication 800-30Revision 1. Information Security [ EB/OL ]. http : //zh. scribd, com/doc/111782669/ Nist-guide-for-Conduction-Risk-Asses-Sp800-30-Revl -Ipd.
  • 9CHRISTOPHER A, AUDREY D, STEVENS J. Carol Wood-y. Introduction to the OCTAVE? Approach [ EB/OL ]. ht- tp: //www. cert. org/octave/approachjntro, pdf.
  • 10Microsoft. The security risk management guidel. 1 [ R/OL]. ht- tp: //technet. mierosofL com.

共引文献110

同被引文献55

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部