Research on Anomaly Monitoring Algorithm of Uncertain Large Data Flow Based on Artificial Intelligence

  • Shuang-cheng JiaEmail author
  • Feng-ping Yang
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 302)


In order to improve the monitoring ability of uncertain large data stream, an uncertain large data flow monitoring algorithm based on artificial intelligence is proposed. The collected uncertain big data flow is constructed by low dimensional feature set, and the rough set model of uncertain large data stream distribution is constructed. The fuzzy C-means clustering method is used to analyze the uncertain big data flow by fusion clustering and adaptive grid partition analysis. All the abnormal samples of large data stream are sampled and trained, and the feature quantities of association rules of uncertain large data stream are extracted. Combined with artificial intelligence method, the monitoring of uncertain large data stream is realized. The simulation results show that the method has high accuracy and good ability to resist abnormal traffic interference, and the traffic security monitoring ability of the network is improved.


Artificial intelligence Uncertain large data stream Anomaly monitoring Clustering 


  1. 1.
    Wang, Z., Huang, M., et al.: Integrated algorithm based on density peaks and density-based clustering. J. Comput. Appl. 39(2), 398–402 (2019)Google Scholar
  2. 2.
    Farnadi, G., Bach, S.H., Moens, M.F., et al.: Soft quantification in statistical relational learning. Mach. Learn. 106(12), 1971–1991 (2017)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Tu, B., Chuai, R., Xu, H.: Outlier detection based on k-mean distance outlier factor for gait signal. Inf. Control 48(1), 16–21 (2019)Google Scholar
  4. 4.
    Wei, X.S., Luo, J.H., Wu, J.: Selective convolutional descriptor aggregation for fine-grained image retrieval. IEEE Trans. Image Process. 26(6), 2868–2881 (2017)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Han, D., Chen, X., Lei, Y., et al.: Real-time data analysis system based on Spark Streaming and its application. J. Comput. Appl. 37(5), 1263–1269 (2017)Google Scholar
  6. 6.
    Hao, S.G., Zhang, L., Muhammad, G.: A union authentication protocol of cross-domain based on bilinear pairing. J. Softw. 8(5), 1094–1100 (2013)CrossRefGoogle Scholar
  7. 7.
    Ma, Z., Chen, W.: Friction torque calculation method of ball bearings based on rolling creepage theory. J. Mech. Eng. 53(22), 219–224 (2017)CrossRefGoogle Scholar
  8. 8.
    Zhou, S.B., Xu, W.X.: A novel clustering algorithm based on relative density and decision graph. Control Decis. 33(11), 1921–1930 (2018)zbMATHGoogle Scholar
  9. 9.
    Tu, G., Yang, X., Zhou, T.: Efficient identity-based multi-identity fully homomorphic encryption scheme. J. Comput. Appl. 39(3), 750–755 (2019)Google Scholar
  10. 10.
    Ma, L., Zhang, T., Ma, D., Fu, Y.: Access network selection algorithm based on Markov model. Comput. Eng. 45(5), 105–109, 115 (2019)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Alibaba Network Technology Co., Ltd.BeijingChina

Personalised recommendations