Font Size: a A A

The Analysis And Design Of Clustering Algorithm In Telecom Network Security Evaluation

Posted on:2011-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZhangFull Text:PDF
GTID:2178360308961348Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the development of telecom network and computer network, network security technology has become a hot spot of network technology. Telecom Network Security Evaluation could enable operators to determine that it is adequacy security to use its network products and systems for their own applications or not, which implied a security risk is acceptable or not.In addition, in order to ensure the security of national information infrastructure the relevant administrative departments also calls for security evaluation of products and systems to determine their safety and reliability. Therefore, it is necessary to do security evaluation for the network product and system,and it will also be of great significance for network development.Clustering algorithm is one of the main research directions in Data mining. At present, the research has been deep into the database, data mining, statistics, telecommunications, banking, business and other areas and has made great achievements.This article will focus on K-means algorithm to make a deeply discussion.This article firstly discussed the principle of telecom network security evaluation,related technologies and based on this characteristic to improve K-means algorithm.To Summarize,this paper has done some work as following:1)Introduce the status of telecommunication networks and their security review,and take a research on the telecom network security assessment principles,methods and steps for further study.2) The key technology of data mining as well as the algorithm is excavated deeply. In allusion to the application of its safety assessment in telecommunications,telecommunications network characteristics and the original system was improved. 3) The initial value of parameter k value problem for the K-means algorithm is proposed a solution.It is mainly from the initial focal point of the selection and to improve clustering algorithms performance aspects.4) There is a testing for improved telecommunications security evaluation platform of research, and this research paper can also be used in follow-up clustering algorithm to further study the safety evaluation platform in the telecom network applications.This topic is designed to predict and analyse cases for telecom operators in the process of network and service security reinforcement, and put forward a number of trends to enhance the security of networks and services under the application of data mining algorithms.Through the examples to introduce how to use the K-means algorithm for telecom network security evaluation.By analyzing the data and events that took place between the internal networks we can forecast the possible emergence of network security issues at next time.Finally we can prevent in advance and respond in time.Security information could also be aggregated to a network management center. It would be helpful to improve network management efficiency and reduce cost of network management.At the end this article describe the future development prospect. Currently, in many companies of IT systems, network security work has only just begun,so the application of network security technology will be developed greatly.
Keywords/Search Tags:Clustering Algorithm, Telecom Network, Security Evaluation, Data Mining
PDF Full Text Request
Related items