检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:伍慧怡 梁焕桢 陈虹安 梁炎新 吕松松 郑欣健 WU Huiyi;LIANG Huanzhen;CHEN Hongan;LIANG Yanxin;LYU Songsong;ZHENG Xinjian(Jiangmen Preschool Education College,Jiangmen 529000,China;Jiangmen Polytechnic,Jiangmen 529090,China)
机构地区:[1]广东江门幼儿师范高等专科学校,广东江门529000 [2]江门职业技术学院,广东江门529090
出 处:《现代信息科技》2024年第17期36-42,共7页Modern Information Technology
基 金:江门市科学技术局2023年度江门市基础与理论科学研究类科技计划项目(江科〔2023〕111号)。
摘 要:无线通信网络漏洞类型复杂,传统方法难以准确同时检测不同类型的漏洞,为此提出基于被动分簇算法的无线通信网络漏洞深度挖掘方法。采用基于被动分簇的网关节点计算方法,在网络出现通信需求时,通过被动式分簇算法设置簇头,遵循网络健壮性和能量有效性间的均衡原则,明确网关节点。使用基于信息熵的异常网关节点聚类筛选机制,锁定网络中异常网关节点,通过基于自回归模型的漏洞节点深度挖掘方法,在异常网关节点所连接簇头的管辖范围中,结合漏洞判断阈值条件,识别存在漏洞的底层普通节点,实现无线通信网络漏洞深度挖掘。实验结果表明,该方法可在0.3 s之内完成无线通信网络漏洞深度挖掘,且挖掘结果准确无误。The types of vulnerabilities in wireless communication networks are complex,and traditional methods are difficult to accurately detect different types of vulnerabilities simultaneously.Therefore,a deep mining method for wireless communication network vulnerability based on passive clustering algorithm is proposed.This paper adopts gateway node calculation method based on passive clustering.When there is a communication demand in the network,the cluster head is set through the passive clustering algorithm,following the principle of balancing network robustness and energy efficiency to clarify the gateway nodes.It uses the clustering and filtering mechanism for abnormal gateway nodes based on information entropy to lock the abnormal gateway nodes in the network.Through a vulnerability node deep mining method based on autoregressive models,it identifies the underlying ordinary nodes within the jurisdiction of the cluster heads connected to the abnormal network nodes,combined with vulnerability judgment threshold conditions,so as to achieve deep mining in wireless communication network vulnerability.The experimental results show that this method can complete deep mining of wireless communication network vulnerability within 0.3 seconds,and the mining results are accurate.
关 键 词:被动分簇算法 无线通信 网络漏洞 深度挖掘 簇头节点 网关节点
分 类 号:TP393.0[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33