应用于移动作业系统的安全检测算法研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on security detection algorithm applied to mobile operating systems
  • 作者:崔恒志 ; 王纪军 ; 徐明生
  • 英文作者:CUI Hengzhi;WANG Jijun;XU Mingsheng;Southeast University;State Grid Jiangsu Electric Power Co.,Ltd.;Jiangsu Electric Power Information Technology Co.,Ltd.;
  • 关键词:移动作业 ; 安全检测 ; 决策树 ; 数据分类 ; TF-IDF ; 检测率
  • 英文关键词:mobile operation;;security detection;;decision tree;;data classification;;TF-IDF;;detection rate
  • 中文刊名:XDDJ
  • 英文刊名:Modern Electronics Technique
  • 机构:东南大学;国网江苏省电力有限公司;江苏电力信息技术有限公司;
  • 出版日期:2019-01-29 17:52
  • 出版单位:现代电子技术
  • 年:2019
  • 期:v.42;No.530
  • 语种:中文;
  • 页:XDDJ201903024
  • 页数:3
  • CN:03
  • ISSN:61-1224/TN
  • 分类号:98-100
摘要
针对传统的安全检测方法无法有效应对移动网络恶意入侵问题,提出一种基于ID3决策树算法的安全检测算法。根据移动作业系统运行模型分析,设计相应的安全检测模型。通过TF-IDF对异常内容的敏感词进行权值计算和排序,并采用ID3决策树算法对解析后的数据进行分类,实验结果验证了提出的安全检测算法的有效性。相比于朴素贝叶斯算法,所提出算法具有较高的检测率。
        The traditional security detection method can not effectively deal with the malicious intrusion problem of the mobile network. Therefore,a security detection algorithm based on ID3 decision tree algorithm is proposed. According to the operation model analysis of the mobile operating system,the corresponding safety detection model is designed. The weights of the sensitive words of abnormal content are calculated and sorted by means of TF-IDF,and the ID3 decision tree algorithm is used to classify the parsed data. The experimental results show that the proposed security detection algorithm is effective,and has higher detection rate than Naive Bayes algorithm.
引文
[1] PACINI E,MATEOS C,GARINO C G. Distributed job scheduling based on swarm intelligence:a survey[J]. Computers&electrical engineering,2014,40(1):252-269.
    [2] NAVIMIPOUR N J,RAHMANI A M,NAVIN A H,et al. Job scheduling in the expert cloud based on genetic algorithms[J].Kybernetes,2014,43(8):1262-1275.
    [3] WANG X,WANG Y,YUE C. A new multi-objective bi-level programming model for energy and locality aware multi-job scheduling in cloud computing[J]. Future generation computer systems,2014,36(7):91-101.
    [4] HANAMSAGAR A,BORATE B,JANE N,et al. Detection of firewall policy anomalies in real-time distributed network security appliances[J]. International journal of computer applications,2015,116(6):215-221.
    [5]李博,宋广军.应用数据挖掘算法检测云计算中的DDoS攻击[J].齐齐哈尔大学学报(自然科学版),2014(6):1-4.LI Bo,SONG Guangjun. Application of data mining algorithm to detect DDoS attacks in cloud computing[J]. Journal of Qiqihar University(natural science edition),2014(6):1-4.
    [6] SEN S,DETECTION M,DETECTION A,et al. Using instanceweighted Naive Bayes for adapting concept drift in masquerade detection[J]. International journal of information security,2014,13(6):583-590.
    [7] NISHIMURA S. Optimal job scheduling of M/GI/1 queue with feedback:the discounted case[J]. Journal of the Operations Research Society of Japan,2017,31(3):371-388.
    [8] CHEN K,ZHANG Z,LONG J,et al. Turning from TF-IDF to TF-IGM for term weighting in text classification[J]. Expert systems with applications:an international journal, 2016, 66(C):245-260.
    [9] PHU V N,TRAN V T N,CHAU V T N,et al. A decision tree using ID3 algorithm for English semantic analysis[J]. International journal of speech technology,2017,20(4):1-21.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700