Javascript must be enabled to continue!
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
View through CrossRef
Denial of service attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they have brought great harm to the network society. Denial of service (Dos) is a phenomenon in which a large number of useless data packets or obstructive content are maliciously transmitted to the target server, which makes the target server unable to provide users with normal services. Denial of service attack (Dos attack) is a very typical network attack method, and the main harm of Dos attack is to exhaust service resources, making the computer or network unable to provide normal services. And AKN (adaptive Kohonen network) is an adaptive neural network proposed in recent years, and an algorithm summarized by using the characteristics of the neural network is called the AKN algorithm. This algorithm can realize fast, low‐consumption, and high‐precision denial of service detection in complex networks. In the era of big data, network security is becoming more and more important, and in order to maintain the security of network data, this article studies the common forms and principles of Dos attacks, as well as the current corresponding defense detection methods. It also investigates several commonly used algorithms of computer data mining technology, such as clustering algorithms, classification algorithms, neural network algorithms, regression algorithms, website data mining, and association algorithms, and proposes a computer data mining model based on the AKN algorithm. In addition, the computer data mining technology based on the AKN algorithm is used to conduct defensive detection experiments under Dos attacks and compares with classic algorithms. Experimental results show that experiments based on the AKN algorithm have better defensive detection effects than classic algorithms, with a detection accuracy rate of more than 97% and a detection efficiency improvement of more than 20%.
Title: Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Description:
Denial of service attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they have brought great harm to the network society.
Denial of service (Dos) is a phenomenon in which a large number of useless data packets or obstructive content are maliciously transmitted to the target server, which makes the target server unable to provide users with normal services.
Denial of service attack (Dos attack) is a very typical network attack method, and the main harm of Dos attack is to exhaust service resources, making the computer or network unable to provide normal services.
And AKN (adaptive Kohonen network) is an adaptive neural network proposed in recent years, and an algorithm summarized by using the characteristics of the neural network is called the AKN algorithm.
This algorithm can realize fast, low‐consumption, and high‐precision denial of service detection in complex networks.
In the era of big data, network security is becoming more and more important, and in order to maintain the security of network data, this article studies the common forms and principles of Dos attacks, as well as the current corresponding defense detection methods.
It also investigates several commonly used algorithms of computer data mining technology, such as clustering algorithms, classification algorithms, neural network algorithms, regression algorithms, website data mining, and association algorithms, and proposes a computer data mining model based on the AKN algorithm.
In addition, the computer data mining technology based on the AKN algorithm is used to conduct defensive detection experiments under Dos attacks and compares with classic algorithms.
Experimental results show that experiments based on the AKN algorithm have better defensive detection effects than classic algorithms, with a detection accuracy rate of more than 97% and a detection efficiency improvement of more than 20%.
Related Results
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
PERSEPSI MAHASISWA VOKASI TERHADAP PEMBUATAN TUGAS VIDEO PADA MATA KULIAH PENDIDIKAN AGAMA DI AKN ACEH BARAT
PERSEPSI MAHASISWA VOKASI TERHADAP PEMBUATAN TUGAS VIDEO PADA MATA KULIAH PENDIDIKAN AGAMA DI AKN ACEH BARAT
AbstractThe Religious Education course makes video projects an alternative assignment. This video project aims to hone students' abilities to translate the thoughts and theories th...
PEMANFAATAN YOUTUBE UNTUK MEMPEROLEH PASSIVE INCOME BAGI PENGAJAR DI AKN KAJEN
PEMANFAATAN YOUTUBE UNTUK MEMPEROLEH PASSIVE INCOME BAGI PENGAJAR DI AKN KAJEN
Pengajar merupakan bagian dari masyarakat yang memiliki tugas penting dan berat yaitu mencetak Sumber Daya Manusia (SDM) yang unggul. Beratnya tugas pengajar tak lepas dari beragam...
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cyber defense in breadth: Modeling and analysis of integrated defense systems
Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or servic...
Optimisation of potash mining technology for cell and pillar mining method
Optimisation of potash mining technology for cell and pillar mining method
The diverse demand for inorganic fertilizers has predetermined the intensification of potash mining, which is a raw material for their production. In this regard, it has become nec...
Abnormal Status Detection of Catenary Based on TSNE Dimensionality
Reduction Method and IGWO-LSSVM Model
Abnormal Status Detection of Catenary Based on TSNE Dimensionality
Reduction Method and IGWO-LSSVM Model
Background:
Catenary is a crucial component of an electrified railroad's traction power supply system.
There is a considerable incidence of abnormal status and failures due to prol...
French Technological Development in Nodule Mining
French Technological Development in Nodule Mining
ABSTRACT
Since 1971, AFERNOD has studied mining concepts which are adapted to the requirements of commercial exploitation of the nodules deposits together with su...
The Hazards of Data Mining in Healthcare
The Hazards of Data Mining in Healthcare
From the mid-1990s, data mining methods have been used to explore and find patterns and relationships in healthcare data. During the 1990s and early 2000's, data mining was a topic...

