The application of data mining technology in computer network security

被引:3
|
作者
Ma Xiao-li [1 ]
Zhang Xiao-lei [1 ]
机构
[1] ShjJiaZhuang Informat Engn Vocat Coll, Shijiazhuang 050000, Hebei, Peoples R China
关键词
Data mining; The network invasion; Detection; The simulation;
D O I
10.1109/ICMTMA.2015.274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of network technology, traditional computer network management technology has been difficult to meet the need for large, complex network management. Introduction of data mining technology in the network management, network the huge amounts of data extraction, transformation, integration of the required data, provide a comprehensive technology, correlation analysis for policymakers and analysts timely and accurately to global comprehensive analysis of data resources, to dig out useful knowledge from them to efficiently implement comprehensive management of network. The introduction of data mining and development has become a development of the intelligent network management system an inevitable trend.
引用
收藏
页码:1126 / 1129
页数:4
相关论文
共 50 条
  • [31] RETRACTED: Application Research of Data Encryption Technology in Computer Network Information Security (Retracted Article)
    Wang, Meilin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [32] Application of machine learning algorithm and data evaluation in computer network security situation awareness technology
    Zhang, Xuxia
    Chen, Weijie
    Wang, Jian
    Fang, Rang
    Intelligent Decision Technologies, 2024, 18 (04) : 2827 - 2839
  • [33] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [34] The research on Data Flow Technology in Computer Network Security Monitoring
    Yin XiaoHong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 787 - 789
  • [35] The Research of Data Stream Technology in Computer Network Security Monitoring
    Li Li
    Hu ZhiYu
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1904 - 1907
  • [36] Research on Data Stream Technology in Computer Network Security Monitoring
    Xiong Wei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1978 - 1981
  • [37] The Application of Cloud Computing Technology in Network Data Security
    Shi, Liang
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 912 - 916
  • [38] The application of cloud computing technology in network data security
    Shi, Liang, 1600, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [39] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):
  • [40] The application of data mining technology in oil and gas pipeline security management
    Zhang, Zhen
    Li, Zhuxin
    Guo, Jianke
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1462 - +