Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for analyzing boundary data by clustering method

A boundary data and clustering analysis technology, applied in the field of computer technology and data processing, can solve problems such as inability to detect and warn in time, abnormal business transmission, abnormal data format and content, etc.

Active Publication Date: 2020-02-28
云南艾拓信息技术有限公司 +1
View PDF12 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if a comprehensive log analysis system is deployed, it only collects all the logs of each device for analysis, and can only understand the operation status of each device, but cannot display the business operation status of the border data exchange platform. When the network delay is too large and the business transmission When the abnormality, the transmitted data format and content are abnormal, it is impossible to detect and warn in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for analyzing boundary data by clustering method
  • Method and system for analyzing boundary data by clustering method
  • Method and system for analyzing boundary data by clustering method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Such as figure 1 As shown, the specific implementation steps of the method for boundary data analysis by the clustering method in the present invention are as follows:

[0049] Step 1: Collect all kinds of log data generated during the border data exchange process, and obtain a standard data collection. Taking the public security border exchange platform as an example, the standard data collection of log data refers to the data exchange process of a certain business performed by the public security border exchange platform In , all relevant log data generated by relevant equipment, links and data exchange systems;

[0050] Step 2: This example is based on the public security border data exchange platform, taking the passenger accommodation information uploaded by a hotel as an example, based on prior experience, the uploaded file size (KB) and the corresponding transmission time (ms) are used as key variables . The corresponding key variable data are extracted from t...

Embodiment 2

[0114] This example is in the public security border data exchange platform. Taking the data exchange system as an example, the number of ftp connections and the port bandwidth occupancy rate of the data exchange system are used as key variables. The key variable data are as follows:

[0115] {90,40; 86,41; 89,40; 88,42; 86,39; 92,42; 91,43; 87,38; 82,36; 83,35; ,30; 74,29; 76,32; 73,28; 74,30; 75,29; 99,45; 98,44; 100,46; 101,48; 97,46; 100,47}.

[0116] And preset the threshold K=4, and select 4 points as the initial centroids, namely {90, 40; 82, 33; 75, 30; 100, 46}.

[0117] Substitute the key variable data into the K-means algorithm of the following formula (1) for cluster analysis, and calculate the key variable x and each centroid μ i (i.e. μ 1 ~ μ 4 ) Euclidean distance E:

[0118]

[0119] In the formula, x is the key variable, C i The cluster code after cluster division, that is, C 1 , C 2 , C 3 , C 4 ;

[0120] When first calculated, μ i The initial c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for analyzing boundary data by a clustering method. The method comprises: presetting key variables and thresholds in various log data generated by the boundary data exchange behavior; and classifying the data by using a clustering algorithm to obtain a clustering analysis result, performing clustering analysis on the data generated by the new boundarydata exchange behavior to obtain a result, comparing the result with the established form so as to discover outliers, identify and count the outliers, and giving an alarm when the outliers exceed a threshold value. The system comprises a data acquisition module, a variable analysis and storage module, a clustering analysis module, a clustering analysis result storage module, a clustering analysisresult comparison module, an outlier identification module, an outlier identification frequency statistics module and an alarm module. According to the invention, abnormal high-risk data exchange behaviors can be discovered in time by integrating the service operation condition of the boundary data exchange platform, and stable and normal operation of the boundary data exchange service is ensured,so that scientific and reasonable management and control on the exchange service are realized.

Description

technical field [0001] The invention relates to the fields of computer technology and data processing technology, in particular to a method and system for analyzing boundary data by clustering. Background technique [0002] The border access platform of the public security information communication network is the basic platform for the public security information communication network to carry out the border access business and conduct authorized access and data exchange operations with the public security information communication network. It provides various access services for data exchange and communication with the public security information communication network. In order to realize the security monitoring and auditing of the access business and ensure the security of the public security information communication network for the authorized access network channel, it is necessary to design a boundary data analysis method. However, the existing technology does not have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/18G06K9/62G06Q50/26
CPCG06F16/1815G06Q50/265G06F18/23213
Inventor 金梦赵健王吉川高睿张放李柏磊李嘉殷安平汪心玲金雪娇邵微段跃李绍峰
Owner 云南艾拓信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products