Big data network security index correlation measure based on the fusion of modified two order cone programming model

被引:0
|
作者
Lan, Xiaohai [1 ]
机构
[1] Guangdong Mech & Elect Polytech, Sch Elect & Commun, Guangzhou 510515, Guangdong, Peoples R China
关键词
big data; modified two order cone programming model; network security; correlation measure;
D O I
10.1504/IJIPT.2021.113899
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing technology can not meet the needs of large data network security index measurement in the era of big data. New theories and methods need to be explored to support the application of large data. In this paper, an improved second-order cone programming model (MTOCPM) is used as the data expression vector. The power spectral density feature of large data is extracted from a large number of noisy and fuzzy data. The second-order cone programming model of large data information flow is constructed by rough concept lattice method. Combining with the finite convergence of the second-order cone programming model algorithm, the reliability of each clustering sample is measured, and the accurate search of data clustering centre is realised. Experiments show that the method based on MTOCPM fusion can not only greatly reduce the communication cost between network nodes, but also improve the global measurement accuracy by about 10%.
引用
收藏
页码:16 / 22
页数:7
相关论文
共 29 条
  • [1] On second order cone programming approach to two-stage network data envelopment analysis
    Roshdi, Israfil
    Mahdiloo, Mahdi
    Arjomandi, Amir
    Margaritis, Dimitris
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2023, 309 (02) : 953 - 956
  • [2] Second order cone programming approach to two-stage network data envelopment analysis
    Chen, Kun
    Zhu, Joe
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2017, 262 (01) : 231 - 238
  • [3] Information flow-based second-order cone programming model for big data using rough concept lattice
    Wang, Pin
    Wu, Wei
    Zeng, Lingyu
    Zhong, Hongmei
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (03): : 2257 - 2266
  • [4] Information flow-based second-order cone programming model for big data using rough concept lattice
    Pin Wang
    Wei Wu
    Lingyu Zeng
    Hongmei Zhong
    [J]. Neural Computing and Applications, 2023, 35 : 2257 - 2266
  • [5] A note on second order cone programming approach to two-stage network data envelopment analysis
    Guo, Chuanyin
    Wei, Fajie
    Chen, Yao
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2017, 263 (02) : 733 - 735
  • [6] Three kinds of network security situation awareness model based on big data
    Zhu, Bowen
    Chen, Yonghong
    Cai, Yiqiao
    [J]. International Journal of Network Security, 2019, 21 (01) : 115 - 121
  • [7] Distribution network reconfiguration based on second order cone bi-level programming considering security distance
    Jiang, Jun
    Cheng, Lexiang
    Sun, Guoqiang
    He, Weiguo
    Wang, Chunning
    Xu, Honghua
    Wei, Zhinong
    Zang, Haixiang
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2019, 47 (04): : 9 - 16
  • [8] Exploration of a network security situational awareness model based on multisource data fusion
    Li, Xingguo
    Zhong, Yu
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (36): : 25083 - 25095
  • [9] Exploration of a network security situational awareness model based on multisource data fusion
    Xingguo Li
    Yu Zhong
    [J]. Neural Computing and Applications, 2023, 35 : 25083 - 25095
  • [10] An XML-based network security data fusion model for collaborative event management
    Xu, Hui
    Xiao, Debao
    Liu, Huifen
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 957 - 961