The Application of Network Anomaly Mining Technology in Campus Network Information Security
- https://doi.org/10.2991/iccia.2012.450How to use a DOI?
- Web log, Campus network, information security, data mining algorithm
Web Service architecture gradually matures in the related applications of campus network, but campus network anomaly mining technology still needs further development in its confidentiality, integrity, and non-repudiation problems. In SOA, campus network anomaly mining technology still needs to strengthen safety and reliability. Based on suffix tree technology, this paper proposed the application of campus network information security technology based on network anomaly mining technology, analyzed the campus network security features in detail, and designed an anomaly mining algorithm on suffix tree campus network security. Computer simulation results show that the proposed method can rapidly mine the abnormalities of the network and ensure the security of campus network.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Bin Wang AU - Zhi-chao Zhao AU - Yong-cheng Jiang PY - 2014/05 DA - 2014/05 TI - The Application of Network Anomaly Mining Technology in Campus Network Information Security BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 1793 EP - 1796 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.450 DO - https://doi.org/10.2991/iccia.2012.450 ID - Wang2014/05 ER -