计算机科学 ›› 2015, Vol. 42 ›› Issue (11): 134-137.doi: 10.11896/j.issn.1002-137X.2015.11.028

• 网络与通信 • 上一篇    下一篇

异构复杂信息网络下的异常数据检测算法

穆丽文,彭贤博,黄岚   

  1. 吉林大学计算机科学与技术学院 长春130012,吉林大学计算机科学与技术学院 长春130012,吉林大学计算机科学与技术学院 长春130012
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61472159),吉林省创新团队项目(20122805),吉林省科技发展项目(20140101180JC)资助

Abnormal Data Detection Algorithm in Heterogeneous Complex Information Network

MU Li-wen, PENG Xian-bo and HUANG Lan   

  • Online:2018-11-14 Published:2018-11-14

摘要: 异构复杂信息网络承载着不同的协议和网络信道,并通过云储存实现资源调度,由此产生的异常数据会给网络信息空间带来安全威胁和存储开销,所以需要进行异常数据准确检测。传统的检测算法采用简化梯度算法进行异常数据检测,不能有效去除多个已知干扰频率成分的异常数据,检测性能不好。提出一种基于自适应陷波级联模型的异常数据检测算法。构建异构复杂信息网络系统模型,采用固有模态分解把异常数据信号解析模型分解为多个窄带信号,设计二阶格型陷波器结构,用多个固定陷波器级联抑制干扰成份,采用匹配投影法寻求优化特征解,找出所有匹配的特征点对,从而实现异常数据检测的改进。仿真实验表明,采用该算法进行异常数据检测时,信号幅值大于干扰噪声数据幅值;该算法提高了检测性能,具有较好的抗干扰性能。

关键词: 网络,异常数据,检测,自适应陷波器

Abstract: Heterogeneous information network carries different protocols and network channels,and realizes the resource scheduling through the cloud storage,resulting in abnormal data which can cause security threat and storage overhead to the network information space,so accurate detection of abnormal data is essential.The traditional detection algorithms use the simplified gradient algorithm for outlier detection,which cannot effectively remove multiple abnormal data of known interference frequency components,so the detection performance is not good.An abnormal data detection algorithm was proposed based on adaptive notch cascade model.The heterogeneous information network system model is constructed,and by using the intrinsic mode decomposition,the abnormal data signal analytical model is decomposed into multiple narrowband signals.Two order lattice notch filter structure is designed,and a plurality of fixing notch filters cascade is used to suppress the interference components.Matching projection method is used to seek the optimized feature solution,and all matching feature point pairs are find out,realizing the improvement of outlier detection.Simulation results show that,when the algorithm is used in data detection,signal amplitude is larger than the amplitude of noise interference data.It can improve the detection performance,and anti-interference performance is better.

Key words: Network,Abnormal data,Detection,Adaptive notch filter

[1] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619
[2] Miorandi D,Sicari S,Pellegrini F D,et al.Internet of things:vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516
[3] Chen L,Brian K,Jamie E.Theoretical Characterization of Nonlinear Clipping Effects in IM/DD Optical OFDM Systems[J].IEEE Transactions on Communications,2012,60(8):2304-2312
[4] 饶雨泰,杨凡.网络入侵搅动下的网络失稳控制方法研究[J].科技通报,2014,0(1):185-188 Rao Yu-tai,Yang fan.Network Intrusion Stir the Network Instability Control Methods of the Research[J].Bulletin of Scie-nce and Technology,2014,0(1):185-188
[5] 王光浩,吴越.一种车载自组织网络路况信息的数据信任模型[J].计算机科学,2014,1(6):89-93 Wang Guang-hao,Wu Yue.Data Trust Model for Road Information in Vehicular Ad hoc Network[J].Computer Science,2014,1(6):89-93
[6] 王瑞,马艳.基于分数阶傅里叶变换的线性调频脉冲信号波达方向估计[J].兵工学报,2014,5(3):421-427 Wang Rui,Ma Yan.DOA Estimation of Wideband Linear Frequency Modulated Pulse Signals Based on Fractional Fourier Transform[J].Acta Armamentarii,2014,5(3):421-427
[7] 罗亮,吴文峻,张飞.面向云计算数据中心的能耗建模方法[J].软件学报,2014,5(7):1371-1387 Luo Liang,Wu Wen-jun,Zhang Fei.Energy Modeling Based on Cloud Data Center[J].Journal of Software,2014,5(7):1371-1387
[8] 陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法[J] 计算机学报,2012,35(5):1011-1017Chen Hao,Yang Jun-an,Zhuang Zhen-quan.The Core of Attri-butes and Minimal Attributes reduction in Variable Precision Rough Set[J].Chinese Journal of Computers,2012,35(5):1011-1017
[9] Zhou Yan,Li Jian-xun,Wang Dong-li.Target tracking in wireless sensor networks using adaptive measurement quantization [J].Science China Information Sciences,2012,55(4):827-838
[10] Xu Jian,Li Jian-xun,Xu Sheng.Data fusion for target tracking in wireless sensor networks using quantized innovations and Kalman filtering [J].Science China Information Sciences,2012,55(3):530-544
[11] 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,26(8):85-90 Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing Niversity of Technology(Natural Science),2012,6(8):85-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!