计算机科学 ›› 2013, Vol. 40 ›› Issue (2): 95-97.

• 网络与通信 • 上一篇    下一篇

基于B-ISVM算法的物联网云存储数据伪装不良信息检测

贾长云,梁海军   

  1. (淮海工学院信息中心 连云港222005)
  • 出版日期:2018-11-16 发布日期:2018-11-16

Things Networking Cloud Storage Data Bad Information Detection Based on Boundary-incremental SVM Algorithm

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对物联网云存储数据伪装不良信息隐蔽性造成的信息量预处理困难、深层次语义理解不准确和样本不均衡等问题,提出了一种基于B-ISVM(Boundary-Incremental SVM)算法的物联网云存储数据不良信息检测算法。在该算法中,首先采取基于均值和标准差的K均值初始聚类分析对云存储数据信息量进行样本空间训练分类;然后将所有样本类进行欧氏距离遍历计算,得到类间子聚类中心距离矩阵和各聚类中心的邻界子聚类区;再通过信息量伪装与筛选原理进行云存储信息真伪筛选,以不良信息在伪信息中发生的概率为指数、以数据安全度阂值和不良伪装信息模板向量集的相似度阂值为指标,对云存储信息量进行识别;最后进行增量模式学习,得到各分类样本最终的最优分类超平面,并将各类检测出的不良伪装信息进行输出。系统测试证明,该算法能快速有效地对物联网云存储数据中的伪装信息进行检测。

关键词: 真伪信息,不良信息伪装,信息过滤,相似度计算,SVM

Abstract: In order to solve the problem that things networking cloud storage data network camouflage bad information concealment causes information preprocessing difficulties, deep semantic understanding not accurate and sample disequilibrium, etc.,this paper put forward the things networking cloud storage data bad information detection based on Boundary-Incremental SVM algorithm This algorithm firstly takes mean initial clustering analysis based on mean and standard deviation of cloud storage data information for sample space training classification, and then puts all the sample classes euchdean distance traversal calculation to get son clustering center distance matrix between class and the clustering center adjacent boundary son clustering region,and then through the information content camouflage and selection principle of cloud storage information makes authenticity screening, using probability occurred in bad information in the false information as index, the data safety threshold and bad camouflage information template vector set of similarity threshold value as indexes,identifies the cloud storage information pseudo,finally carries on the incremental mode study, obtains each classification sample final optimal separating hyper plane, and will detect all kinds of bad camouflage information output System test proves that this algorithm can fast effective in things networking cloud storage data of camouflage information detection

Key words: True bogus information, Bad information camouflage, Information filtering, Similarity calculation, SVM

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!