The Application of Network Anomaly Mining Technology in Campus Network Information Security

Article Preview

Abstract:

Web Service architecture gradually matures in the related applications of campus network, but campus network anomaly mining technology still needs further development in its confidentiality, integrity, and non-repudiation problems. In SOA, campus network anomaly mining technology still needs to strengthen safety and reliability. Based on suffix tree technology, this paper proposed the application of campus network information security technology based on network anomaly mining technology, analyzed the campus network security features in detail, and designed an anomaly mining algorithm on suffix tree campus network security. Computer simulation results show that the proposed method can rapidly mine the abnormalities of the network and ensure the security of campus network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

998-1002

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hugo Haas. W3C: Web Services Glossary,. http: /www. w3. org/TR/ws- Gloss,2004, 2.

Google Scholar

[2] Heather Kreger. Web Services Conceptual Architecture(WSCA 1. 0)[M]. 2001, 5.

Google Scholar

[3] MicrosoftTechNet: Web Service Security,. http: / www. microsoft. com/china/technet/security/guidance/secmod10. mspx#E2D. 2004. 4.

Google Scholar

[4] Sune Jakobsson. Security mechanism for web services,. http: / www. eurescom. eu/message/ messageJun2003/Security_mechanism_for_Web_Services. asp.

Google Scholar

[5] Kent Ka lok Tong. Developing Web Services With Apache Axis2[M]. ISBN: 978-99937-929-1-8. 2008, 3:150-198.

Google Scholar