Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

The Application of Network Anomaly Mining Technology in Campus Network Information Security

Authors
Bin Wang, Zhi-chao Zhao, Yong-cheng Jiang
Corresponding Author
Bin Wang
Available Online May 2014.
DOI
10.2991/iccia.2012.450How to use a DOI?
Keywords
Web log, Campus network, information security, data mining algorithm
Abstract

Web Service architecture gradually matures in the related applications of campus network, but campus network anomaly mining technology still needs further development in its confidentiality, integrity, and non-repudiation problems. In SOA, campus network anomaly mining technology still needs to strengthen safety and reliability. Based on suffix tree technology, this paper proposed the application of campus network information security technology based on network anomaly mining technology, analyzed the campus network security features in detail, and designed an anomaly mining algorithm on suffix tree campus network security. Computer simulation results show that the proposed method can rapidly mine the abnormalities of the network and ensure the security of campus network.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
978-94-91216-41-1
ISSN
1951-6851
DOI
10.2991/iccia.2012.450How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Bin Wang
AU  - Zhi-chao Zhao
AU  - Yong-cheng Jiang
PY  - 2014/05
DA  - 2014/05
TI  - The Application of Network Anomaly Mining Technology in Campus Network Information Security
BT  - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
PB  - Atlantis Press
SP  - 1793
EP  - 1796
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccia.2012.450
DO  - 10.2991/iccia.2012.450
ID  - Wang2014/05
ER  -