首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境下入侵疑似边界问题改进算法
引用本文:茹蓓,贺新征.云计算环境下入侵疑似边界问题改进算法[J].沈阳工业大学学报,2017,39(5):545-550.
作者姓名:茹蓓  贺新征
作者单位:1. 新乡学院 计算机与信息工程学院, 河南 新乡 453003; 2. 河南大学 计算机与信息工程学院, 河南 开封 475000
基金项目:河南省科技厅科技攻关项目(172102210445);河南省科技厅软科学研究资助项目(152400410345);河南省教育厅资助项目(15A520093)
摘    要:传统的疑似边界问题处理算法一直存在边界确定结果不准确、误差较大的问题,为了提高网络安全性能,提出一种基于模糊网络阈值计算的云计算环境下入侵检测中疑似边界确定算法,分析了云计算环境下入侵种类及其检测原理,并确定其入侵形式;通过计算模糊网络阈值,确定云计算环境下入侵检测中疑似边界具体参数.仿真实验结果表明,采用改进算法进行疑似边界的确定,其结果精度及效率均优于传统算法,具有一定的优势.

关 键 词:云计算环境  入侵检测  疑似边界  阈值计算  模糊网络  边界确定  网络安全性  入侵形式  

Improved algorithm for intrusion suspected boundary problem in cloud computing environment
RU Bei,HE Xin-zheng.Improved algorithm for intrusion suspected boundary problem in cloud computing environment[J].Journal of Shenyang University of Technology,2017,39(5):545-550.
Authors:RU Bei  HE Xin-zheng
Affiliation:1. School of Computer and Information Engineering, Xinxiang University, Xinxiang 453003, China; 2. School of Computer and Information Engineering, Henan University, Kaifeng 475000, China
Abstract:The traditional processing method for the suspected boundary problem always shows the inaccurate boundary determination results and larger errors. In order to improve the network security, a determination method for the suspected boundary in the intrusion detection in the cloud computing environment based on the fuzzy network threshold calculation was proposed. In addition, the intrusion types and detection principle in the cloud computing environment were analyzed, and the intrusion forms were determined. Through calculating the fuzzy network threshold, the specific parameters for the suspected boundary in the intrusion detection in the cloud computing environment were determined. The results of simulation experiment show that when the improved method is used for the determination of suspected boundary, the accuracy and efficiency of corresponding results are superior to those of results obtained with the traditional method, and the improved method has certain advantages.
Keywords:cloud computing environment  intrusion detection  suspected boundary  threshold calculation  fuzzy network  boundary determination  network security  intrusion form  
本文献已被 CNKI 等数据库收录!
点击此处可从《沈阳工业大学学报》浏览原始摘要信息
点击此处可从《沈阳工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号