Research Article

Big Data-Driven Hierarchical Local Area Network Security Risk Event Prediction Algorithm

Table 4

Description of network node communication transmission volume.

StepsAlgorithm consumptionDescription code

1For the filtered securityImport numpy as np
2The event merging functionFor (int i = 101; i < 200; i+ = 2)
3A large number of security events Def nms (dets, thresh):
4Accuracy of security eventsPublic static void main (String[] args) {
5The accuracy of fusion is lower Int f1 = 1, f2 = 1, f;
6Compared with centralized fusion Int M = 30;
7Communication and energy consumption System.out.println (f1);
8Data-driven hierarchical local area X1 = dets[:, 0]
9The merging rules are under Y1 = dets[:, 1]
10Connect the database through vulnerability X2 = dets[:, 2]
11Environmental condition error Y2 = dets[:, 3]
12It reduces the amount of Scores = dets[:,4]
13A group of variables representing For (int i = 3; i < M; i++) {
14Many duplicate or similar incidents F = f2;
15The false alarm rate and false alarm rate F2 = f1 + f2;
16Other methods have fewer feature Order = scores.argsort()[-1]
17Vulnerability category labelsKeep = []
18System command injection While order.size > 0:
19Access verification error I = order[0]
20It divides vulnerabilities into Keep.append(i)