国产欧美精品一区二区,中文字幕专区在线亚洲,国产精品美女网站在线观看,艾秋果冻传媒2021精品,在线免费一区二区,久久久久久青草大香综合精品,日韩美aaa特级毛片,欧美成人精品午夜免费影视

云計算架構中惡意代碼入侵自動(dòng)監測系統設計
DOI:
CSTR:
作者:
作者單位:

廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院

作者簡(jiǎn)介:

通訊作者:

中圖分類(lèi)號:

基金項目:


Design of malicious code intrusion automatic monitoring system in cloud computing architecture
Author:
Affiliation:

School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College

Fund Project:

  • 摘要
  • |
  • 圖/表
  • |
  • 訪(fǎng)問(wèn)統計
  • |
  • 參考文獻
  • |
  • 相似文獻
  • |
  • 引證文獻
  • |
  • 資源附件
  • |
  • 文章評論
    摘要:

    為了解決云計算架構中惡意代碼以各種形式入侵產(chǎn)生損害,不能及時(shí)發(fā)現、維護而造成云計算架構安全性能降低,無(wú)法正常使用的問(wèn)題,建立一套基于BP神經(jīng)網(wǎng)絡(luò )的入侵監測系統,實(shí)現對云計算架構中惡意代碼入侵的自動(dòng)監測,對及時(shí)監測入侵惡意代碼及有效增加云計算架構安全有這直接而又重要作用;系統以STM32F103ZET6為主控芯片構建MUC主控單元,并通過(guò)EZ-USB FX2 USB2.0控制芯片將各個(gè)模塊與其相連;采用LM2575系列的穩壓器,為系統提供電源;軟件設計過(guò)程中,采用BP神經(jīng)網(wǎng)絡(luò )法計算各惡意代碼入侵的輸出值,降低監測誤差;通過(guò)實(shí)驗測試表明,該系統可實(shí)現云計算架構中入侵惡意代碼的自動(dòng)監測功能,且具有擴展性強、操作方便等特點(diǎn),對云計算架構的使用安全性具有重要的應用價(jià)值。

    Abstract:

    In order to solve the malicious code of cloud computing architecture in various forms of intrusion damage, can not be found in time and maintenance caused by cloud computing architecture safety performance is reduced, not the normal use of the problem, based on a BP neural network intrusion detection system, realize the calculation of automatic monitoring in the framework of the invasion of the malicious code on the cloud, have an important role in the direct and timely monitoring of security computing architecture intrusion malicious code and effectively increase the cloud system; using STM32F103ZET6 as main control chip of the main control unit of MUC, and the EZ-USB FX2 USB2.0 control chip is connected with each module; using LM2575 series voltage regulator, power supply system; software design process, the output of the calculation of the invasion of the malicious code the value of using BP neural network method, reduce the monitoring error; the experiments show that the system can achieve the cloud The automatic monitoring function of intrusion malicious code in the architecture has the characteristics of strong expansibility and easy operation, and has important application value to the security of the cloud computing architecture.

    參考文獻
    相似文獻
    引證文獻
引用本文

郭雅,駱金維,李泗蘭.云計算架構中惡意代碼入侵自動(dòng)監測系統設計計算機測量與控制[J].,2018,26(7):128-131.

復制
分享
文章指標
  • 點(diǎn)擊次數:
  • 下載次數:
  • HTML閱讀次數:
  • 引用次數:
歷史
  • 收稿日期:2017-09-06
  • 最后修改日期:2017-09-06
  • 錄用日期:2017-09-27
  • 在線(xiàn)發(fā)布日期: 2018-07-26
  • 出版日期:
文章二維碼
桃源县| 大安市| 台前县| 曲水县| 公安县| 河池市| 阜新| 克什克腾旗| 丹阳市| 邢台县| 松阳县| 涡阳县| 金秀| 新津县| 招远市| 平湖市| 德令哈市| 闽清县| 尼勒克县| 汨罗市| 渭源县| 河北省| 宝坻区| 西乡县| 乐昌市| 蒲城县| 沐川县| 赣榆县| 静海县| 专栏| 儋州市| 酒泉市| 无棣县| 三穗县| 永平县| 延川县| 叙永县| 河池市| 彭泽县| 额敏县| 丹东市|