大数据网络入侵过程的痕迹数据监测方法研究
DOI:
作者:
作者单位:

重庆市气象局

作者简介:

通讯作者:

中图分类号:

TP393.08

基金项目:


Big data network intrusion traces of process data monitoring method research
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    大数据网络数据规模巨大,对入侵过程痕迹数据进行监测的效率通常较低,一些带有入侵痕迹的数据特征在大数据环境下,特征逐渐淡化,当前方法无法在淡化的情况下准确采集痕迹数据的特点,无法形成待监测数据与痕迹数据之间的关系,导致监测效率和精度低下,提出一种基于模糊聚类概率的大数据网络入侵过程的痕迹数据监测方法,将采集的痕迹数据转换成频域信号,对其进行频谱或功率谱分析,依据时间变化的幅值将其转换成随频率变化的功率。采用核主元分析对痕迹数据信号特征进行提取,利用非线性转换将样本痕迹数据信号从输入空间映射至高维特征空间,在高维特征空间中通过PCA进行痕迹数据信号的频域特征提取。构建一个数学模型对特征模糊聚类概率进行描述,对待监测数据和痕迹数据之间的特征模糊聚类概率进行计算,通过衡量理论进行对比分析使大数据网络入侵过程中的痕迹数据被完整的监测。实验结果表明,所提方法不仅所需时间少,而且监测精度高。

    Abstract:

    Big data network data size, traces the process of intrusion data monitoring efficiency is low, often some data with invasion of trace characteristics under the environment of big data, characteristic gradually fade out, under the condition of current method can"t played down the characteristics of accurate gathering trace data, unable to form for monitoring data and trace data, the relationship between the monitoring efficiency and low accuracy, put forward a kind of big data network based on fuzzy clustering probability of process data monitoring method, the trace of the collected data into frequency domain signal, the spectrum and power spectrum analysis, according to the time change amplitude convert them to change with frequency power. Using kernel principal component analysis to trace data signal characteristic extraction, using nonlinear transformation to trace sample data signals from the input space is mapped to high-dimensional feature space, in the high dimensional feature space by PCA to trace data signal in the frequency domain feature extraction. Build a mathematical model to simulate the characteristics of fuzzy clustering probability description, treatment of monitoring data and trace data between the characteristics of the fuzzy clustering probability calculation, by comparing the measure theory makes big data in the process of network intrusion trace monitoring data is complete. The experimental results show that the proposed method is not only less time required, and monitoring of high precision.

    参考文献
    相似文献
    引证文献
引用本文

张凯. 大数据网络入侵过程的痕迹数据监测方法研究[J]. 科学技术与工程, 2016, 16(14): .
zhangkai. Big data network intrusion traces of process data monitoring method research[J]. Science Technology and Engineering,2016,16(14).

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2016-01-27
  • 最后修改日期:2016-02-01
  • 录用日期:2016-03-04
  • 在线发布日期: 2016-05-18
  • 出版日期:
×
律回春渐,新元肇启|《科学技术与工程》编辑部恭祝新岁!
亟待确认版面费归属稿件,敬请作者关注