About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part II

Research Article

Research on Network Security Authentication Method Based on Data Mining Technology

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-94182-6_2,
        author={Xiao-gang Ma and Huan-yu Wang},
        title={Research on Network Security Authentication Method Based on Data Mining Technology},
        proceedings={IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part II},
        proceedings_a={IOTCARE PART 2},
        year={2022},
        month={6},
        keywords={Network security Data mining Machine learning algorithm Safety certification},
        doi={10.1007/978-3-030-94182-6_2}
    }
    
  • Xiao-gang Ma
    Huan-yu Wang
    Year: 2022
    Research on Network Security Authentication Method Based on Data Mining Technology
    IOTCARE PART 2
    Springer
    DOI: 10.1007/978-3-030-94182-6_2
Xiao-gang Ma1,*, Huan-yu Wang2
  • 1: Shandong Vocational College of Science and Technology
  • 2: College of Earth Environment and Science, Southwest Jiao Tong University
*Contact email: maxiaogang698@aliyun.com

Abstract

In order to solve the problems of low authentication accuracy, long authentication time and poor authentication security in traditional network security authentication methods, this paper uses data mining technology to design a new network security authentication method. First, analyze the types of attacks on the network by illegal nodes on the network and the principles of authentication, and then mine the data to be authenticated through the binary network. In order to reduce the mining error, the acquired data is punished and integrated. In this process, in order to ensure the effective iteration of the data, the neural network algorithm in the machine learning algorithm is introduced for in-depth mining. The experimental results show that the authentication accuracy of this method can reach up to 98%, and the authentication time is always less than 2 s. The above results show that: after adopting this method, the network security performance can be improved.

Keywords
Network security Data mining Machine learning algorithm Safety certification
Published
2022-06-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-94182-6_2
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL