[1]张佳乐[],张秀芳[],张桂玲[].基于模糊综合策略的用户行为评估方法 [J].计算机技术与发展,2017,27(05):138-143.
 ZHANG Jia-le[],ZHANG Xiu-fang[],ZHANG Gui-ling[]. User Behavior Evaluation in Trusted Network Based on Fuzzy Comprehensive Strategy[J].,2017,27(05):138-143.
点击复制

基于模糊综合策略的用户行为评估方法 

()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年05期
页码:
138-143
栏目:
安全与防范
出版日期:
2017-05-10

文章信息/Info

Title:
 User Behavior Evaluation in Trusted Network Based on Fuzzy Comprehensive Strategy
文章编号:
1673-629X(2017)05-0138-06
作者:
 张佳乐[1] 张秀芳[2] 张桂玲[1]
 1.天津工业大学 计算机科学与软件学院;2.廊坊师范学院 数信学院
Author(s):
 ZHANG Jia-le[1] ZHANG Xiu-fang[2] ZHANG Gui-ling[1]
关键词:
 可信网络用户行为评估模糊综合策略综合指标权重模糊算子
Keywords:
 trusted networkuser behavior evaluationfuzzy comprehensive strategycomprehensive index weightfuzzy operator
分类号:
TP393
文献标志码:
A
摘要:
 对网络用户行为的可信性评估是当今可信网络领域的研究热点之一.针对传统可信网络用户行为评估方法的主观性、局限性和静态性等问题,提出了一种基于模糊综合策略(FCS)的可信评估方法,并结合可信网络用户行为度量机制设计了用户行为评估模型.该评估模型使用模糊综合评价的方法对用户行为和特征属性进行挖掘分析,以此为基础构建了评价指标及综合指标权重,并运用模糊算子对评估结果进行加权运算,从而准确地量化用户行为评估结果.通过仿真实验对四种用户行为进行了基于FCS的可信判定,并与其他两种用户行为可信判定策略进行了对比分析.实验结果与分析表明,所提出的方法能够在复杂网络环境中对用户行为进行全面、准确和动态的量化评估,且评估结果更加切合实际.
Abstract:
 The credibility evaluation of network user behavior is one of the hot spots in the field of trusted network.Due to the problems of subjectivity,limitations and static for the traditional user behavior evaluation ways in trusted network,a new trust evaluation method based on Fuzzy Comprehensive Strategy (FCS) has been put forward,and the user behavior trust evaluation model has been designed by combining with the trusted network user behavior measurement mechanism.In the new trusted evaluation model,user behaviors and attributes have been mined and analyzed by using fuzzy comprehensive evaluation method.Thus the evaluation indexes and the index weights can be constructed.The accurate user behavior evaluation quantization results have been obtained by weighted computing with proposed fuzzy operators based on indexes and index weights above.Experimental simulation have evaluated the four kinds of user behaviors with FCS evaluation methods,and compared them with the other two kinds of trusted evaluation methods of user behavior.The experiments and analysis show that the proposed methods can evaluate the user’s behavior comprehensively,accurately and dynamically in complex network environments and the simulation results are more realistic.

相似文献/References:

[1]李熊达 何利.基于自动信任协商的可信网络研究[J].计算机技术与发展,2009,(09):150.
 LI Xiong-da,HE Li.Study of Trusted Network Based on Automated Trust Negotiation[J].,2009,(05):150.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.

更新日期/Last Update: 2017-07-07