计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 73-76.doi: 10.11896/j.issn.1002-137X.2019.04.011

• 大数据与数据科学 • 上一篇    下一篇

基于模糊神经网络的异常网络数据挖掘算法

许磊, 王建新   

  1. 北京林业大学信息学院 北京100083
  • 收稿日期:2018-03-28 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 王建新(1972-),男,博士,教授,博士生导师,主要研究方向为应用数学、软件工程、数据挖掘,E-mail:wangjx@bjfu.edu.cn(通信作者)。
  • 作者简介:许 磊(1992-),男,硕士生,主要研究方向为数据挖掘、大数据;
  • 基金资助:
    本文受国家自然科学基金(61170268)资助。

Data Mining Algorithm of Abnormal Network Based on Fuzzy Neural Network

XU Lei, WANG Jian-xin   

  1. School of Information Science & Technology,Beijing Forestry University,Beijing 100083,China
  • Received:2018-03-28 Online:2019-04-15 Published:2019-04-23

摘要: 异常网络数据受到聚类中心的模糊加权扰动的影响,导致数据挖掘的聚类性不好。文中提出一种基于模糊神经网络的异常网络数据挖掘算法,该算法根据异常网络数据的混合分类属性进行相似度分析,提取异常网络数据的数值属性特征和分类属性特征,采用联合关联规则分析方法进行异常网络数据的模糊融合处理,采用基于模糊质心相异性的度量方法构建异常网络数据的分类模糊集,并在模糊数据集中进行异常网络数据混合加权和自适应分块匹配,进而提取异常网络数据的弱关联化特征量,最后将提取的特征量输入到模糊神经网络分类器中进行数据分类识别,完成异常网络数据的优化挖掘。仿真结果表明,采用所提方法进行异常网络数据挖掘的数据聚类性较好,挖掘过程的收敛性和抗干扰性较强。

关键词: 模糊神经网络, 特征提取, 挖掘, 异常网络数据

Abstract: Abnormal network data are affected by the fuzzy weighted disturbance of the clustering center,which leads to poor clustering of data mining.This paper proposed a data mining algorithm of anomaly network based on fuzzy neural network.Similarity analysis is performed according to the mixed classification attributes of abnormal network data,the numerical and classification attributes of abnormal network data are extracted,and the fuzzy fusion processing of the abnormal network data is carried out by using the joint association rule analysis method.The classification fuzzy set of abnormal network data is constructed based on fuzzy centroid heterogeneity measurement method.In the fuzzy data set,abnormal network data are weighted by mixing and adaptive block matching,and the weak correlation characteristic quantity of abnormal network data is extracted.The extracted features are input into the fuzzy neural network classifier for data classification and recognition,and the optimized mining of abnormal network data is completed.The simulation results show that the proposed method has good data clustering ability for anomaly network data mining.The mining process has strong convergence and anti-interference.

Key words: Abnormal network data, Feature extraction, Fuzzy neural network, Mining

中图分类号: 

  • TP391
[1]HUANG C.Cloud computing environment of huge amounts of optical fiber communication fault data mining algorithms[J].Laser Journal,2017,38(1):96-100.
[2]ZHANG S,ZHANG L.W-PAM restricted clustering algorithm in data mining[J].Computer Science,2016,43(S2):447-450.(in Chinese)
张松,张琳.一种数据挖掘中的W-PAM限制聚类算法[J].计算机科学,2016,43(S2):447-450.
[3]PANG T J,LIANG J Y.A large standard hybrid data clustering algorithm based on sampling[J].Computer Science,2016,43(9):209-212.(in Chinese)
庞天杰,梁吉业.一种基于抽样的大规范混合数据聚类集成算法[J].计算机科学,2016,43(9):209-212.
[4]MORADI M,KEYVANPOUR M R.An analytical review of
XML association rules mining[J].Artificial Intelligence Review,2015,43(2):277-300.
[5]DONG G L,RYU K S,BASHIR M,et al.Discovering medical knowledge using association rule mining in young adults with acute myocardial infarction[J].Journal of Medical Systems,2013,37(2):1-10.
[6]KHALILI A,SAMI A.SysDetect:a systematic approach to cri-
tical state determination for industrial intrusion detection systems using Apriori algorithm[J].Journal of Process Control,2015,2776:154-160.
[7]MERNIK M,LIU S H,KARABOGA M D,et al.On clarifying misconceptions when comparing variants of the Artificial Bee Colony Algorithm by offering a new implementation[J].Information Sciences,2015,291(10):115-127.
[8]ZHAO X J,SUN Z X,YUAN Y.An efficient association rule mining algorithm based on predetermined screening[J].Journal of Electronics & Infromation Technology,2015,37(7):1620-1625.
[9]XU K Y,GONG X R,CHENG M C.An audit log association
rule mining based on improved Apriori algorithm[J].Journal of Computer Applications,2016,36(7):1847-1851.
[10]LI M D,ZHAO H,WENG X W,et al.Differential evolution algorithm based on optimal gaussian random walk and individual selection strategy[J].Control and Decision,2016,31(8):1379-1386.
[11]BI S,HO C K,ZHANG R.Wireless powered communication:
opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125.
[12]SUN L J,CHEN X D,HAN C,et al.New Fuzzy-Clustering Algorithm for Data Stream[J].Journal of Electronics & Infromation Technology,2015,37(7):1620-1625.
[13]BI A Q,DONG A M,WANG S T.A dynamic data stream clus-
tering algorithm based on probability and exemplar[J].Journal of Computer Research and Development,2016,53(5):1029-1042.
[14]XING C Z,LIU J.Evolutionary data stream clustering algorithm based on integration of affinity propagation and density[J].Journal of Computer Applications,2015,35(7):1927-1932.
[15]CHEN H,WAN G X,XIAO Z J.Intrusion detection method of deep belief network model based on optimization of data processing[J].Journal of Computer Applications,2017,37(6):1636-1643.
ZHANG X C,SANG R T,ZHOU Z H,et al.A Short Text Classification Method Based on Two-Channel Convolutional Neural Network .Journal of Chongqing University of Technology(Natural Science),2019,33(1):45-52.(in Chinese)
张小川,桑瑞婷,周泽红,等. 一种基于双通道卷积神经网络的短文本分类方法法.重庆理工大学学报(自然科学),2019,33(1):45-52.
[1] 黎嵘繁, 钟婷, 吴劲, 周帆, 匡平.
基于时空注意力克里金的边坡形变数据插值方法
Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation
计算机科学, 2022, 49(8): 33-39. https://doi.org/10.11896/jsjkx.210600161
[2] 陈圆圆, 王志海.
基于聚类分区的多维数据流概念漂移检测方法
Concept Drift Detection Method for Multidimensional Data Stream Based on Clustering Partition
计算机科学, 2022, 49(7): 25-30. https://doi.org/10.11896/jsjkx.210600155
[3] 张源, 康乐, 宫朝辉, 张志鸿.
基于Bi-LSTM的期货市场关联交易行为检测方法
Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM
计算机科学, 2022, 49(7): 31-39. https://doi.org/10.11896/jsjkx.210400304
[4] 曾志贤, 曹建军, 翁年凤, 蒋国权, 徐滨.
基于注意力机制的细粒度语义关联视频-文本跨模态实体分辨
Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism
计算机科学, 2022, 49(7): 106-112. https://doi.org/10.11896/jsjkx.210500224
[5] 程成, 降爱莲.
基于多路径特征提取的实时语义分割方法
Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction
计算机科学, 2022, 49(7): 120-126. https://doi.org/10.11896/jsjkx.210500157
[6] 刘伟业, 鲁慧民, 李玉鹏, 马宁.
指静脉识别技术研究综述
Survey on Finger Vein Recognition Research
计算机科学, 2022, 49(6A): 1-11. https://doi.org/10.11896/jsjkx.210400056
[7] 高元浩, 罗晓清, 张战成.
基于特征分离的红外与可见光图像融合算法
Infrared and Visible Image Fusion Based on Feature Separation
计算机科学, 2022, 49(5): 58-63. https://doi.org/10.11896/jsjkx.210200148
[8] 高志宇, 王天荆, 汪悦, 沈航, 白光伟.
基于生成对抗网络的5G网络流量预测方法
Traffic Prediction Method for 5G Network Based on Generative Adversarial Network
计算机科学, 2022, 49(4): 321-328. https://doi.org/10.11896/jsjkx.210300240
[9] 么晓明, 丁世昌, 赵涛, 黄宏, 罗家德, 傅晓明.
大数据驱动的社会经济地位分析研究综述
Big Data-driven Based Socioeconomic Status Analysis:A Survey
计算机科学, 2022, 49(4): 80-87. https://doi.org/10.11896/jsjkx.211100014
[10] 左杰格, 柳晓鸣, 蔡兵.
基于图像分块与特征融合的户外图像天气识别
Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion
计算机科学, 2022, 49(3): 197-203. https://doi.org/10.11896/jsjkx.201200263
[11] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[12] 乔杰, 蔡瑞初, 郝志峰.
一种基于信息瓶颈的因果关系挖掘方法
Mining Causality via Information Bottleneck
计算机科学, 2022, 49(2): 198-203. https://doi.org/10.11896/jsjkx.210100053
[13] 任首朋, 李劲, 王静茹, 岳昆.
基于集成回归决策树的lncRNA-疾病关联预测方法
Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction
计算机科学, 2022, 49(2): 265-271. https://doi.org/10.11896/jsjkx.201100132
[14] 马董, 李新源, 陈红梅, 肖清.
星型高影响的空间co-location模式挖掘
Mining Spatial co-location Patterns with Star High Influence
计算机科学, 2022, 49(1): 166-174. https://doi.org/10.11896/jsjkx.201000186
[15] 张亚迪, 孙悦, 刘锋, 朱二周.
结合密度参数与中心替换的改进K-means算法及新聚类有效性指标研究
Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index
计算机科学, 2022, 49(1): 121-132. https://doi.org/10.11896/jsjkx.201100148
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!