Computer Science ›› 2019, Vol. 46 ›› Issue (4): 73-76.doi: 10.11896/j.issn.1002-137X.2019.04.011

• Big Data & Data Science • Previous Articles     Next Articles

Data Mining Algorithm of Abnormal Network Based on Fuzzy Neural Network

XU Lei, WANG Jian-xin   

  1. School of Information Science & Technology,Beijing Forestry University,Beijing 100083,China
  • Received:2018-03-28 Online:2019-04-15 Published:2019-04-23

Abstract: Abnormal network data are affected by the fuzzy weighted disturbance of the clustering center,which leads to poor clustering of data mining.This paper proposed a data mining algorithm of anomaly network based on fuzzy neural network.Similarity analysis is performed according to the mixed classification attributes of abnormal network data,the numerical and classification attributes of abnormal network data are extracted,and the fuzzy fusion processing of the abnormal network data is carried out by using the joint association rule analysis method.The classification fuzzy set of abnormal network data is constructed based on fuzzy centroid heterogeneity measurement method.In the fuzzy data set,abnormal network data are weighted by mixing and adaptive block matching,and the weak correlation characteristic quantity of abnormal network data is extracted.The extracted features are input into the fuzzy neural network classifier for data classification and recognition,and the optimized mining of abnormal network data is completed.The simulation results show that the proposed method has good data clustering ability for anomaly network data mining.The mining process has strong convergence and anti-interference.

Key words: Abnormal network data, Feature extraction, Fuzzy neural network, Mining

CLC Number: 

  • TP391
[1]HUANG C.Cloud computing environment of huge amounts of optical fiber communication fault data mining algorithms[J].Laser Journal,2017,38(1):96-100.
[2]ZHANG S,ZHANG L.W-PAM restricted clustering algorithm in data mining[J].Computer Science,2016,43(S2):447-450.(in Chinese)
张松,张琳.一种数据挖掘中的W-PAM限制聚类算法[J].计算机科学,2016,43(S2):447-450.
[3]PANG T J,LIANG J Y.A large standard hybrid data clustering algorithm based on sampling[J].Computer Science,2016,43(9):209-212.(in Chinese)
庞天杰,梁吉业.一种基于抽样的大规范混合数据聚类集成算法[J].计算机科学,2016,43(9):209-212.
[4]MORADI M,KEYVANPOUR M R.An analytical review of
XML association rules mining[J].Artificial Intelligence Review,2015,43(2):277-300.
[5]DONG G L,RYU K S,BASHIR M,et al.Discovering medical knowledge using association rule mining in young adults with acute myocardial infarction[J].Journal of Medical Systems,2013,37(2):1-10.
[6]KHALILI A,SAMI A.SysDetect:a systematic approach to cri-
tical state determination for industrial intrusion detection systems using Apriori algorithm[J].Journal of Process Control,2015,2776:154-160.
[7]MERNIK M,LIU S H,KARABOGA M D,et al.On clarifying misconceptions when comparing variants of the Artificial Bee Colony Algorithm by offering a new implementation[J].Information Sciences,2015,291(10):115-127.
[8]ZHAO X J,SUN Z X,YUAN Y.An efficient association rule mining algorithm based on predetermined screening[J].Journal of Electronics & Infromation Technology,2015,37(7):1620-1625.
[9]XU K Y,GONG X R,CHENG M C.An audit log association
rule mining based on improved Apriori algorithm[J].Journal of Computer Applications,2016,36(7):1847-1851.
[10]LI M D,ZHAO H,WENG X W,et al.Differential evolution algorithm based on optimal gaussian random walk and individual selection strategy[J].Control and Decision,2016,31(8):1379-1386.
[11]BI S,HO C K,ZHANG R.Wireless powered communication:
opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125.
[12]SUN L J,CHEN X D,HAN C,et al.New Fuzzy-Clustering Algorithm for Data Stream[J].Journal of Electronics & Infromation Technology,2015,37(7):1620-1625.
[13]BI A Q,DONG A M,WANG S T.A dynamic data stream clus-
tering algorithm based on probability and exemplar[J].Journal of Computer Research and Development,2016,53(5):1029-1042.
[14]XING C Z,LIU J.Evolutionary data stream clustering algorithm based on integration of affinity propagation and density[J].Journal of Computer Applications,2015,35(7):1927-1932.
[15]CHEN H,WAN G X,XIAO Z J.Intrusion detection method of deep belief network model based on optimization of data processing[J].Journal of Computer Applications,2017,37(6):1636-1643.
ZHANG X C,SANG R T,ZHOU Z H,et al.A Short Text Classification Method Based on Two-Channel Convolutional Neural Network .Journal of Chongqing University of Technology(Natural Science),2019,33(1):45-52.(in Chinese)
张小川,桑瑞婷,周泽红,等. 一种基于双通道卷积神经网络的短文本分类方法法.重庆理工大学学报(自然科学),2019,33(1):45-52.
[1] LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39.
[2] CHEN Yuan-yuan, WANG Zhi-hai. Concept Drift Detection Method for Multidimensional Data Stream Based on Clustering Partition [J]. Computer Science, 2022, 49(7): 25-30.
[3] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[4] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[5] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[6] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[7] GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63.
[8] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[9] YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87.
[10] ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203.
[11] KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173.
[12] QIAO Jie, CAI Rui-chu, HAO Zhi-feng. Mining Causality via Information Bottleneck [J]. Computer Science, 2022, 49(2): 198-203.
[13] REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271.
[14] MA Dong, LI Xin-yuan, CHEN Hong-mei, XIAO Qing. Mining Spatial co-location Patterns with Star High Influence [J]. Computer Science, 2022, 49(1): 166-174.
[15] ZHANG Ya-di, SUN Yue, LIU Feng, ZHU Er-zhou. Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index [J]. Computer Science, 2022, 49(1): 121-132.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!