Computer Science ›› 2015, Vol. 42 ›› Issue (11): 134-137.doi: 10.11896/j.issn.1002-137X.2015.11.028

Previous Articles     Next Articles

Abnormal Data Detection Algorithm in Heterogeneous Complex Information Network

MU Li-wen, PENG Xian-bo and HUANG Lan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Heterogeneous information network carries different protocols and network channels,and realizes the resource scheduling through the cloud storage,resulting in abnormal data which can cause security threat and storage overhead to the network information space,so accurate detection of abnormal data is essential.The traditional detection algorithms use the simplified gradient algorithm for outlier detection,which cannot effectively remove multiple abnormal data of known interference frequency components,so the detection performance is not good.An abnormal data detection algorithm was proposed based on adaptive notch cascade model.The heterogeneous information network system model is constructed,and by using the intrinsic mode decomposition,the abnormal data signal analytical model is decomposed into multiple narrowband signals.Two order lattice notch filter structure is designed,and a plurality of fixing notch filters cascade is used to suppress the interference components.Matching projection method is used to seek the optimized feature solution,and all matching feature point pairs are find out,realizing the improvement of outlier detection.Simulation results show that,when the algorithm is used in data detection,signal amplitude is larger than the amplitude of noise interference data.It can improve the detection performance,and anti-interference performance is better.

Key words: Network,Abnormal data,Detection,Adaptive notch filter

[1] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619
[2] Miorandi D,Sicari S,Pellegrini F D,et al.Internet of things:vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516
[3] Chen L,Brian K,Jamie E.Theoretical Characterization of Nonlinear Clipping Effects in IM/DD Optical OFDM Systems[J].IEEE Transactions on Communications,2012,60(8):2304-2312
[4] 饶雨泰,杨凡.网络入侵搅动下的网络失稳控制方法研究[J].科技通报,2014,0(1):185-188 Rao Yu-tai,Yang fan.Network Intrusion Stir the Network Instability Control Methods of the Research[J].Bulletin of Scie-nce and Technology,2014,0(1):185-188
[5] 王光浩,吴越.一种车载自组织网络路况信息的数据信任模型[J].计算机科学,2014,1(6):89-93 Wang Guang-hao,Wu Yue.Data Trust Model for Road Information in Vehicular Ad hoc Network[J].Computer Science,2014,1(6):89-93
[6] 王瑞,马艳.基于分数阶傅里叶变换的线性调频脉冲信号波达方向估计[J].兵工学报,2014,5(3):421-427 Wang Rui,Ma Yan.DOA Estimation of Wideband Linear Frequency Modulated Pulse Signals Based on Fractional Fourier Transform[J].Acta Armamentarii,2014,5(3):421-427
[7] 罗亮,吴文峻,张飞.面向云计算数据中心的能耗建模方法[J].软件学报,2014,5(7):1371-1387 Luo Liang,Wu Wen-jun,Zhang Fei.Energy Modeling Based on Cloud Data Center[J].Journal of Software,2014,5(7):1371-1387
[8] 陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法[J] 计算机学报,2012,35(5):1011-1017Chen Hao,Yang Jun-an,Zhuang Zhen-quan.The Core of Attri-butes and Minimal Attributes reduction in Variable Precision Rough Set[J].Chinese Journal of Computers,2012,35(5):1011-1017
[9] Zhou Yan,Li Jian-xun,Wang Dong-li.Target tracking in wireless sensor networks using adaptive measurement quantization [J].Science China Information Sciences,2012,55(4):827-838
[10] Xu Jian,Li Jian-xun,Xu Sheng.Data fusion for target tracking in wireless sensor networks using quantized innovations and Kalman filtering [J].Science China Information Sciences,2012,55(3):530-544
[11] 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,26(8):85-90 Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing Niversity of Technology(Natural Science),2012,6(8):85-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!