The application of data mining technology in computer network security

被引:3
|
作者
Ma Xiao-li [1 ]
Zhang Xiao-lei [1 ]
机构
[1] ShjJiaZhuang Informat Engn Vocat Coll, Shijiazhuang 050000, Hebei, Peoples R China
关键词
Data mining; The network invasion; Detection; The simulation;
D O I
10.1109/ICMTMA.2015.274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of network technology, traditional computer network management technology has been difficult to meet the need for large, complex network management. Introduction of data mining technology in the network management, network the huge amounts of data extraction, transformation, integration of the required data, provide a comprehensive technology, correlation analysis for policymakers and analysts timely and accurately to global comprehensive analysis of data resources, to dig out useful knowledge from them to efficiently implement comprehensive management of network. The introduction of data mining and development has become a development of the intelligent network management system an inevitable trend.
引用
收藏
页码:1126 / 1129
页数:4
相关论文
共 50 条
  • [1] The Application of Data Mining Technology in Network Security Management
    Dong Jianfeng
    2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 145 - 148
  • [2] Research on Application of Network Security Technology Based on Data Mining
    Wang, Ning
    Qin, Yanyan
    Guo, Shuyang
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 626 - 635
  • [3] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [4] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834
  • [5] The Application of Data Encryption Technology in Computer Network Communication Security
    Liu, Guanxiu
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [6] Application of data mining technology in detecting network intrusion and security maintenance
    Zhu, Yongkuan
    Gaba, Gurjot Singh
    Almansour, Fahad M.
    Alroobaea, Roobaea
    Masud, Mehedi
    JOURNAL OF INTELLIGENT SYSTEMS, 2021, 30 (01) : 664 - 676
  • [7] Analysis on the Application of Data Mining Technology in Computer Network Virus Defense
    Sun, Hujun
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 417 - 421
  • [8] Research on the Application of Data Encryption Technology in Computer Network Communication Security
    Xia, Kuiliang
    Song, Xiaoming
    2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 164 - 167
  • [9] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 436 - 439
  • [10] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18