{"title":"计算机入侵检测的大数据技术","authors":"Ying Chen","doi":"10.1515/comp-2022-0267","DOIUrl":null,"url":null,"abstract":"Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.","PeriodicalId":1,"journal":{"name":"Accounts of Chemical Research","volume":null,"pages":null},"PeriodicalIF":16.4000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Big data technology for computer intrusion detection\",\"authors\":\"Ying Chen\",\"doi\":\"10.1515/comp-2022-0267\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.\",\"PeriodicalId\":1,\"journal\":{\"name\":\"Accounts of Chemical Research\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":16.4000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Accounts of Chemical Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1515/comp-2022-0267\",\"RegionNum\":1,\"RegionCategory\":\"化学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"CHEMISTRY, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Accounts of Chemical Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/comp-2022-0267","RegionNum":1,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CHEMISTRY, MULTIDISCIPLINARY","Score":null,"Total":0}
Big data technology for computer intrusion detection
Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.
期刊介绍:
Accounts of Chemical Research presents short, concise and critical articles offering easy-to-read overviews of basic research and applications in all areas of chemistry and biochemistry. These short reviews focus on research from the author’s own laboratory and are designed to teach the reader about a research project. In addition, Accounts of Chemical Research publishes commentaries that give an informed opinion on a current research problem. Special Issues online are devoted to a single topic of unusual activity and significance.
Accounts of Chemical Research replaces the traditional article abstract with an article "Conspectus." These entries synopsize the research affording the reader a closer look at the content and significance of an article. Through this provision of a more detailed description of the article contents, the Conspectus enhances the article's discoverability by search engines and the exposure for the research.