国产欧美精品一区二区,中文字幕专区在线亚洲,国产精品美女网站在线观看,艾秋果冻传媒2021精品,在线免费一区二区,久久久久久青草大香综合精品,日韩美aaa特级毛片,欧美成人精品午夜免费影视

云計算架構中惡意代碼入侵自動(dòng)監測系統設計
DOI:
CSTR:
作者:
作者單位:

廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院

作者簡(jiǎn)介:

通訊作者:

中圖分類(lèi)號:

基金項目:


Design of malicious code intrusion automatic monitoring system in cloud computing architecture
Author:
Affiliation:

School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College

Fund Project:

  • 摘要
  • |
  • 圖/表
  • |
  • 訪(fǎng)問(wèn)統計
  • |
  • 參考文獻
  • |
  • 相似文獻
  • |
  • 引證文獻
  • |
  • 資源附件
  • |
  • 文章評論
    摘要:

    為了解決云計算架構中惡意代碼以各種形式入侵產(chǎn)生損害,不能及時(shí)發(fā)現、維護而造成云計算架構安全性能降低,無(wú)法正常使用的問(wèn)題,建立一套基于BP神經(jīng)網(wǎng)絡(luò )的入侵監測系統,實(shí)現對云計算架構中惡意代碼入侵的自動(dòng)監測,對及時(shí)監測入侵惡意代碼及有效增加云計算架構安全有這直接而又重要作用;系統以STM32F103ZET6為主控芯片構建MUC主控單元,并通過(guò)EZ-USB FX2 USB2.0控制芯片將各個(gè)模塊與其相連;采用LM2575系列的穩壓器,為系統提供電源;軟件設計過(guò)程中,采用BP神經(jīng)網(wǎng)絡(luò )法計算各惡意代碼入侵的輸出值,降低監測誤差;通過(guò)實(shí)驗測試表明,該系統可實(shí)現云計算架構中入侵惡意代碼的自動(dòng)監測功能,且具有擴展性強、操作方便等特點(diǎn),對云計算架構的使用安全性具有重要的應用價(jià)值。

    Abstract:

    In order to solve the malicious code of cloud computing architecture in various forms of intrusion damage, can not be found in time and maintenance caused by cloud computing architecture safety performance is reduced, not the normal use of the problem, based on a BP neural network intrusion detection system, realize the calculation of automatic monitoring in the framework of the invasion of the malicious code on the cloud, have an important role in the direct and timely monitoring of security computing architecture intrusion malicious code and effectively increase the cloud system; using STM32F103ZET6 as main control chip of the main control unit of MUC, and the EZ-USB FX2 USB2.0 control chip is connected with each module; using LM2575 series voltage regulator, power supply system; software design process, the output of the calculation of the invasion of the malicious code the value of using BP neural network method, reduce the monitoring error; the experiments show that the system can achieve the cloud The automatic monitoring function of intrusion malicious code in the architecture has the characteristics of strong expansibility and easy operation, and has important application value to the security of the cloud computing architecture.

    參考文獻
    相似文獻
    引證文獻
引用本文

郭雅,駱金維,李泗蘭.云計算架構中惡意代碼入侵自動(dòng)監測系統設計計算機測量與控制[J].,2018,26(7):128-131.

復制
分享
文章指標
  • 點(diǎn)擊次數:
  • 下載次數:
  • HTML閱讀次數:
  • 引用次數:
歷史
  • 收稿日期:2017-09-06
  • 最后修改日期:2017-09-06
  • 錄用日期:2017-09-27
  • 在線(xiàn)發(fā)布日期: 2018-07-26
  • 出版日期:
文章二維碼
威信县| 成安县| 商丘市| 塔河县| 枞阳县| 手游| 德令哈市| 亳州市| 铜梁县| 兰考县| 思茅市| 四川省| 盘山县| 肇源县| 晋江市| 新宾| 筠连县| 嘉祥县| 新巴尔虎左旗| 青铜峡市| 南安市| 达州市| 汝城县| 黎川县| 杭锦旗| 泸溪县| 都昌县| 乌海市| 米林县| 尉氏县| 思茅市| 新密市| 大厂| 集安市| 杭锦后旗| 台北县| 晋城| 通海县| 博罗县| 惠来县| 肇源县|