国产欧美精品一区二区,中文字幕专区在线亚洲,国产精品美女网站在线观看,艾秋果冻传媒2021精品,在线免费一区二区,久久久久久青草大香综合精品,日韩美aaa特级毛片,欧美成人精品午夜免费影视

云計算架構中惡意代碼入侵自動(dòng)監測系統設計
DOI:
CSTR:
作者:
作者單位:

廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院,廣東創(chuàng )新科技職業(yè)學(xué)院 信息工程學(xué)院

作者簡(jiǎn)介:

通訊作者:

中圖分類(lèi)號:

基金項目:


Design of malicious code intrusion automatic monitoring system in cloud computing architecture
Author:
Affiliation:

School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College,School of Information Engineering,Guangdong Innovative Technical College

Fund Project:

  • 摘要
  • |
  • 圖/表
  • |
  • 訪(fǎng)問(wèn)統計
  • |
  • 參考文獻
  • |
  • 相似文獻
  • |
  • 引證文獻
  • |
  • 資源附件
  • |
  • 文章評論
    摘要:

    為了解決云計算架構中惡意代碼以各種形式入侵產(chǎn)生損害,不能及時(shí)發(fā)現、維護而造成云計算架構安全性能降低,無(wú)法正常使用的問(wèn)題,建立一套基于BP神經(jīng)網(wǎng)絡(luò )的入侵監測系統,實(shí)現對云計算架構中惡意代碼入侵的自動(dòng)監測,對及時(shí)監測入侵惡意代碼及有效增加云計算架構安全有這直接而又重要作用;系統以STM32F103ZET6為主控芯片構建MUC主控單元,并通過(guò)EZ-USB FX2 USB2.0控制芯片將各個(gè)模塊與其相連;采用LM2575系列的穩壓器,為系統提供電源;軟件設計過(guò)程中,采用BP神經(jīng)網(wǎng)絡(luò )法計算各惡意代碼入侵的輸出值,降低監測誤差;通過(guò)實(shí)驗測試表明,該系統可實(shí)現云計算架構中入侵惡意代碼的自動(dòng)監測功能,且具有擴展性強、操作方便等特點(diǎn),對云計算架構的使用安全性具有重要的應用價(jià)值。

    Abstract:

    In order to solve the malicious code of cloud computing architecture in various forms of intrusion damage, can not be found in time and maintenance caused by cloud computing architecture safety performance is reduced, not the normal use of the problem, based on a BP neural network intrusion detection system, realize the calculation of automatic monitoring in the framework of the invasion of the malicious code on the cloud, have an important role in the direct and timely monitoring of security computing architecture intrusion malicious code and effectively increase the cloud system; using STM32F103ZET6 as main control chip of the main control unit of MUC, and the EZ-USB FX2 USB2.0 control chip is connected with each module; using LM2575 series voltage regulator, power supply system; software design process, the output of the calculation of the invasion of the malicious code the value of using BP neural network method, reduce the monitoring error; the experiments show that the system can achieve the cloud The automatic monitoring function of intrusion malicious code in the architecture has the characteristics of strong expansibility and easy operation, and has important application value to the security of the cloud computing architecture.

    參考文獻
    相似文獻
    引證文獻
引用本文

郭雅,駱金維,李泗蘭.云計算架構中惡意代碼入侵自動(dòng)監測系統設計計算機測量與控制[J].,2018,26(7):128-131.

復制
分享
文章指標
  • 點(diǎn)擊次數:
  • 下載次數:
  • HTML閱讀次數:
  • 引用次數:
歷史
  • 收稿日期:2017-09-06
  • 最后修改日期:2017-09-06
  • 錄用日期:2017-09-27
  • 在線(xiàn)發(fā)布日期: 2018-07-26
  • 出版日期:
文章二維碼
余姚市| 宝丰县| 阿巴嘎旗| 册亨县| 牡丹江市| 凭祥市| 龙门县| 新密市| 若尔盖县| 铅山县| 宜君县| 宝山区| 萝北县| 庆元县| 古蔺县| 游戏| 永城市| 襄樊市| 乌拉特后旗| 汾阳市| 彩票| 德江县| 安平县| 福建省| 七台河市| 望奎县| 龙海市| 廊坊市| 黔东| 南汇区| 香港| 扎囊县| 岑溪市| 浦江县| 涪陵区| 汽车| 凉城县| 正定县| 靖西县| 阳曲县| 江陵县|