[1]商正仪,梁羽燕,薛建宇,等.基于移动终端的无线局域网用户行为研究[J].计算机技术与发展,2018,28(03):132-136.[doi:10.3969/ j. issn.1673-629X.2018.03.028]
 SHANG Zheng-yi,LIANG Yu-yan,XUE Jian-yu,et al.Research on User Behavior of WLAN Based on Mobile Terminals[J].,2018,28(03):132-136.[doi:10.3969/ j. issn.1673-629X.2018.03.028]
点击复制

基于移动终端的无线局域网用户行为研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
28
期数:
2018年03期
页码:
132-136
栏目:
安全与防范
出版日期:
2018-03-10

文章信息/Info

Title:
Research on User Behavior of WLAN Based on Mobile Terminals
文章编号:
1673-629X(2018)03-0132-05
作者:
商正仪梁羽燕薛建宇陈 伟
南京邮电大学 计算机学院,江苏 南京 210046
Author(s):
SHANG Zheng-yiLIANG Yu-yanXUE Jian-yuCHEN Wei
School of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210046,China
关键词:
无线局域网用户行为分析聚类隐私分析机器学习
Keywords:
WLANuser behavior analysisclusterprivacy analysismachine learning
分类号:
TP393.1
DOI:
10.3969/ j. issn.1673-629X.2018.03.028
文献标志码:
A
摘要:
由于无线空间传播信道所独具的开放性以及特殊辐射性,产生了许多隐私泄露的隐患。 实验在公共环境下对无线局域网通信数据进行了还原,基于当前多类市场主流终端应用充分挖掘了无线网用户行为。 在对用户及其行为建模之后,采用基于加权相似度的非监督聚类算法,进一步研究用户的社会性特征与潜在兴趣趋向。 目的是明确用户的真正需求,增加用户之间的直接关联,便于设计更加贴近用户的协议与服务,优化改进无线网络机制。 实验结果表明,该方法能够有效分析用户行为,聚类用户群体,有助于改善无线网用户使用体验,防范用户隐私泄露以及定制个性化网络服务。
Abstract:
There are many hidden dangers of privacy leakage due to the openness and special radiation of wireless communication channel. The communication data from WLAN is restored in the public environment,and the wireless network users behavior is fully exploited based on the mainstream terminal application in current market. After modeling the users and their behavior,we adopt the non-supervised clustering algorithm based on weighed similarity for further study of the social characteristics and potential interest trend of users. We aim
to clarify the user’s real demand and increase the direct relation between users,in order to design the agreement and service which are more close to users,and optimize the wireless network mechanism. Experiment shows that this method can effectively analyze user’s behavior and cluster user groups,which is help improve the user experience,prevent user’s privacy disclosure and customize personalized web service.

相似文献/References:

[1]刘晓莹 王一 王新安.应用于无线局域网的高速维特比译码器电路[J].计算机技术与发展,2008,(01):11.
 LIU Xiao-ying,WANG Yi,WANG Xin-an.A High Speed Viterbi Circuit Implementation for WLAN System[J].,2008,(03):11.
[2]刘可 徐昌彪 杨士中.无线局域网中的认证机制[J].计算机技术与发展,2008,(01):164.
 LIU Ke,XU Chang-biao,YANG Shi-zhong.Authentication Mechanisms in WLAN[J].,2008,(03):164.
[3]周炜 褚伟.基于Linux的无线局域网协议解析器的设计[J].计算机技术与发展,2008,(03):217.
 ZHOU Wei,CHU Wei.Design of WLAN Protocol Parser Based on Linux[J].,2008,(03):217.
[4]姜永 郑明春 李国强.IEEE802.16中的无线Mesh网络研究[J].计算机技术与发展,2008,(05):234.
 JIANG Yong,ZHENG Ming-chun,LI Guo-qiang.Research on Wireless Mesh Network in IEEE802.16[J].,2008,(03):234.
[5]刘晓明 邓锋 谢李蓉.基于μC/OS-II的IEEE802.11 MAC协议的实现[J].计算机技术与发展,2008,(08):26.
 LIU Xiao-ming,DENG Feng,XIE Li-rong.Realization of IEEE802.11 MAC Protocol Based on μC/OS-II[J].,2008,(03):26.
[6]陈群 周健.无线局域网安全认证的EAP策略[J].计算机技术与发展,2008,(09):123.
 CHEN Qun,ZHOU Jian.EAP Strategy of WLAN's Security Authentication[J].,2008,(03):123.
[7]司纪锋 王美琴 曹宝香.无线局域网MAC地址欺骗攻击的检测[J].计算机技术与发展,2006,(02):232.
 SI Ji-feng,WANG Mei-qin,CAO Bao-xiang.Detecting Wireless LAN MAC Address Spoofing Attack[J].,2006,(03):232.
[8]王莉 刘志愚 刘一兰[].无线局域网WEP协议安全隐患分析[J].计算机技术与发展,2006,(08):55.
 WANG Li,LIU Zhi-yu,LIU Yi-lan.Analysis on Secure Hidden Troubles of Wireless Local Area Network's WEP[J].,2006,(03):55.
[9]邢长明 刘方爱 杨林.无线局域网中非法设备检测方案的设计与实现[J].计算机技术与发展,2006,(10):128.
 XING Chang-ming,LIU Fang-ai,YANG Lin.A Design and Realization of a Rogue - Device Detecting Project in WLAN[J].,2006,(03):128.
[10]殷安生.基于802.11i的WLAN安全认证机制研究与实现[J].计算机技术与发展,2010,(09):127.
 YIN An-sheng.Research and Implementation on Secure Authentication Mechanism of WLAN Based on 802.11i Protocol[J].,2010,(03):127.

更新日期/Last Update: 2018-04-26