计算机科学 ›› 2015, Vol. 42 ›› Issue (11): 134-137.doi: 10.11896/j.issn.1002-137X.2015.11.028
穆丽文,彭贤博,黄岚
MU Li-wen, PENG Xian-bo and HUANG Lan
摘要: 异构复杂信息网络承载着不同的协议和网络信道,并通过云储存实现资源调度,由此产生的异常数据会给网络信息空间带来安全威胁和存储开销,所以需要进行异常数据准确检测。传统的检测算法采用简化梯度算法进行异常数据检测,不能有效去除多个已知干扰频率成分的异常数据,检测性能不好。提出一种基于自适应陷波级联模型的异常数据检测算法。构建异构复杂信息网络系统模型,采用固有模态分解把异常数据信号解析模型分解为多个窄带信号,设计二阶格型陷波器结构,用多个固定陷波器级联抑制干扰成份,采用匹配投影法寻求优化特征解,找出所有匹配的特征点对,从而实现异常数据检测的改进。仿真实验表明,采用该算法进行异常数据检测时,信号幅值大于干扰噪声数据幅值;该算法提高了检测性能,具有较好的抗干扰性能。
[1] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619 [2] Miorandi D,Sicari S,Pellegrini F D,et al.Internet of things:vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516 [3] Chen L,Brian K,Jamie E.Theoretical Characterization of Nonlinear Clipping Effects in IM/DD Optical OFDM Systems[J].IEEE Transactions on Communications,2012,60(8):2304-2312 [4] 饶雨泰,杨凡.网络入侵搅动下的网络失稳控制方法研究[J].科技通报,2014,0(1):185-188 Rao Yu-tai,Yang fan.Network Intrusion Stir the Network Instability Control Methods of the Research[J].Bulletin of Scie-nce and Technology,2014,0(1):185-188 [5] 王光浩,吴越.一种车载自组织网络路况信息的数据信任模型[J].计算机科学,2014,1(6):89-93 Wang Guang-hao,Wu Yue.Data Trust Model for Road Information in Vehicular Ad hoc Network[J].Computer Science,2014,1(6):89-93 [6] 王瑞,马艳.基于分数阶傅里叶变换的线性调频脉冲信号波达方向估计[J].兵工学报,2014,5(3):421-427 Wang Rui,Ma Yan.DOA Estimation of Wideband Linear Frequency Modulated Pulse Signals Based on Fractional Fourier Transform[J].Acta Armamentarii,2014,5(3):421-427 [7] 罗亮,吴文峻,张飞.面向云计算数据中心的能耗建模方法[J].软件学报,2014,5(7):1371-1387 Luo Liang,Wu Wen-jun,Zhang Fei.Energy Modeling Based on Cloud Data Center[J].Journal of Software,2014,5(7):1371-1387 [8] 陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法[J] 计算机学报,2012,35(5):1011-1017Chen Hao,Yang Jun-an,Zhuang Zhen-quan.The Core of Attri-butes and Minimal Attributes reduction in Variable Precision Rough Set[J].Chinese Journal of Computers,2012,35(5):1011-1017 [9] Zhou Yan,Li Jian-xun,Wang Dong-li.Target tracking in wireless sensor networks using adaptive measurement quantization [J].Science China Information Sciences,2012,55(4):827-838 [10] Xu Jian,Li Jian-xun,Xu Sheng.Data fusion for target tracking in wireless sensor networks using quantized innovations and Kalman filtering [J].Science China Information Sciences,2012,55(3):530-544 [11] 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,26(8):85-90 Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing Niversity of Technology(Natural Science),2012,6(8):85-90 |
No related articles found! |
|