Back to Search
Start Over
Malicious Intrusion Data Mining Algorithm of Wireless Personal Communication Network Supported by Legal Big Data.
- Source :
- Wireless Communications & Mobile Computing; 9/25/2021, p1-7, 7p
- Publication Year :
- 2021
-
Abstract
- Wireless personal communication network is easily affected by intrusion data in the communication process, resulting in the inability to ensure the security of personal information in wireless communication. Therefore, this paper proposes a malicious intrusion data mining algorithm based on legitimate big data in wireless personal communication networks. The clustering algorithm is used to iteratively obtain the central point of malicious intrusion data and determine its expected membership. The noise in malicious intrusion data is denoised by objective function, and the membership degree of communication data is calculated. The change factor of the neighborhood center of gravity of malicious intrusion data in wireless personal communication network is determined, the similarity between the characteristics of malicious intrusion data by using the Markov distance was determined, and the malicious intrusion data mining of wireless personal communication network supported by legal big data was completed. The experimental results show that the accuracy of mining malicious data is high and the mining time is short. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 15308669
- Database :
- Complementary Index
- Journal :
- Wireless Communications & Mobile Computing
- Publication Type :
- Academic Journal
- Accession number :
- 152626815
- Full Text :
- https://doi.org/10.1155/2021/8321636