
Research Article
Research on Network Security Authentication Method Based on Data Mining Technology
@INPROCEEDINGS{10.1007/978-3-030-94182-6_2, author={Xiao-gang Ma and Huan-yu Wang}, title={Research on Network Security Authentication Method Based on Data Mining Technology}, proceedings={IoT and Big Data Technologies for Health Care. Second EAI International Conference, IoTCare 2021, Virtual Event, October 18-19, 2021, Proceedings, Part II}, proceedings_a={IOTCARE PART 2}, year={2022}, month={6}, keywords={Network security Data mining Machine learning algorithm Safety certification}, doi={10.1007/978-3-030-94182-6_2} }
- Xiao-gang Ma
Huan-yu Wang
Year: 2022
Research on Network Security Authentication Method Based on Data Mining Technology
IOTCARE PART 2
Springer
DOI: 10.1007/978-3-030-94182-6_2
Abstract
In order to solve the problems of low authentication accuracy, long authentication time and poor authentication security in traditional network security authentication methods, this paper uses data mining technology to design a new network security authentication method. First, analyze the types of attacks on the network by illegal nodes on the network and the principles of authentication, and then mine the data to be authenticated through the binary network. In order to reduce the mining error, the acquired data is punished and integrated. In this process, in order to ensure the effective iteration of the data, the neural network algorithm in the machine learning algorithm is introduced for in-depth mining. The experimental results show that the authentication accuracy of this method can reach up to 98%, and the authentication time is always less than 2 s. The above results show that: after adopting this method, the network security performance can be improved.