Reference Hub8
On Detecting Abnormal Access for Online Ideological and Political Education

On Detecting Abnormal Access for Online Ideological and Political Education

Yuzhu Yang
Copyright: © 2021 |Volume: 12 |Issue: 2 |Pages: 11
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781799861737|DOI: 10.4018/IJDST.2021040104
Cite Article Cite Article

MLA

Yang, Yuzhu. "On Detecting Abnormal Access for Online Ideological and Political Education." IJDST vol.12, no.2 2021: pp.35-45. http://doi.org/10.4018/IJDST.2021040104

APA

Yang, Y. (2021). On Detecting Abnormal Access for Online Ideological and Political Education. International Journal of Distributed Systems and Technologies (IJDST), 12(2), 35-45. http://doi.org/10.4018/IJDST.2021040104

Chicago

Yang, Yuzhu. "On Detecting Abnormal Access for Online Ideological and Political Education," International Journal of Distributed Systems and Technologies (IJDST) 12, no.2: 35-45. http://doi.org/10.4018/IJDST.2021040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the development and spread of networks, online education has become a new way in education. The online education platform encounters a large number of concurrent visiting, while the system must guarantee network security in the process of online education. The network visiting requests are real-time and dynamic in online education. In order to detect network intrusion and abnormal access in real time and adapt to the dynamic changes of network visiting requests, this paper adopts a data stream-based network intrusion detection method to monitor and manage online education visiting. First, a knowledge library is constructed by normal visiting mode and abnormal visiting mode. Second, the dissimilarity between data point and data cluster is used to measure the similarity between normal mode and abnormal mode. Lastly, the knowledge library is updated to reflect the changes of network in online education system by re-clustering. The proposed method is evaluated on a real dataset.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.