| ²é¿´: 759 | »Ø¸´: 1 | ||
lionel0822Ìú³æ (³õÈëÎÄ̳)
|
[ÇóÖú]
ÕªÒª·Ò루ͨÐÅ¡¢¼ÆËã»ú¡¢»úÆ÷ѧϰ£©
|
|
ĿǰÖ÷ÒªµÄ·ÃÎÊȨÏÞ¿ØÖÆ»úÖÆÎª£ºDAC(Discretionary Access Control)¡¢MAC(Mandatory Access Control)¡¢RBAC(Role- based Access Control)¡£±¾ÎÄÖ¼ÔÚÌá³öÒ»ÖÖÐµķ½·¨£¬ÓûúÆ÷ѧϰËã·¨½¨Á¢Ò»¸ö·ÃÎÊȨÏÞ×Ô¶¯»¯ÅäÖõÄÄ£ÐÍ¡£½üÄêÀ´£¬ÔÚ»úÆ÷ѧϰÁìÓò£¬Ô½À´Ô½¶àµÄѧÕ߰ѹØ×¢Öصã·ÅÔÚ¶ÔÔʼÊý¾Ý¼¯µÄ´¦ÀíÉÏ£¬ÒòΪÈç¹ûÄܹ»ÓÃÌØÕ÷¹¤³ÌµÄ·½·¨¾¡¿ÉÄܵÄÍÚ¾ò³öÒþ²ØÔÚÔʼµÄÊý¾Ý¼¯Öеĸü¶àÊý¾Ý¡¢¸ü¶àÌØÕ÷£¬ÓÃÏàͬµÄ»úÆ÷ѧϰËã·¨£¬¿ÉÒԵõ½¸üºÃµÄЧ¹û¡£ ±¾ÎÄÓÉÔʼµÄÊý¾Ý¼¯Éú³ÉÁ˺ܶàеÄÊý¾Ý¼¯¡¢ÌØÕ÷¼¯µÄ×éºÏ£¬½éÉÜÁ˼¸ÖÖ»úÆ÷ѧϰËã·¨£ºÂß¼»Ø¹é¡¢ÌݶÈÌáÉý¾ö²ßÊ÷¡¢Ëæ»úÉÁÖ¡£ÓÃÉÏÊöÈýÖÖËã·¨ÔÚÊý¾Ý¼¯¡¢ÌØÕ÷¼¯µÄ×éºÏÉϲúÉúÁ˺ܶà·ÖÀàÆ÷Ä£ÐÍ£¬×îºóÔÚÉÏÊö¼¸ÖÖµäÐÍ·ÖÀàÆ÷Ä£Ð͵Ļù´¡ÉÏ£¬Ñо¿ÁËһЩ³£ÓõÉѧϰËã·¨£¬²¢ÓÃÁ½ÖÖ¼¯³ÉѧϰËã·¨×éºÏÁËÉÏÊö¼¸ÖÖ·ÖÀàÆ÷Ä£ÐÍ¡£ ¾ßÌåÀ´Ëµ£¬±¾ÎĵŤ×÷Ö÷ÒªÌåÏÖÔÚÒÔϼ¸¸ö·½Ã棺 £¨1£©ÔÚÔʼÊý¾Ý¼¯µÄ»ù´¡ÉÏ£¬²úÉúÁË4¸öеÄÊý¾Ý¼¯¡¢5¸öеÄÌØÕ÷¼¯£¬±¾ÎĽéÉÜÁ˼¸ÖÖÊýѧÉϵĴ¦Àí·½Ê½²¢Ñ¡ÔñÐÔµÄÓ¦ÓÃÔÚÊý¾Ý¼¯ºÍÌØÕ÷¼¯ÉÏ¡£ÓÈÆäÊÇÔÚgreedyÊý¾Ý¼¯µÄ²úÉú¹ý³ÌÖУ¬±¾ÎÄÀûÓÃ̰À·Ç°ÏòÑ¡ÔñµÄÌØÕ÷Ñ¡ÔñËã·¨´Ó·±ÔÓµÄÊý¾Ý¼¯ºÏÖÐÑ¡ÔñÁË×îÓÅ×Ó¼¯¡£ £¨2£©½éÉÜÁËÂß¼»Ø¹é¡¢ÌݶÈÌáÉý¾ö²ßÊ÷¡¢Ëæ»úÉÁֵȻúÆ÷ѧϰËã·¨£¬·Ö±ðÔÚ²»Í¬µÄѵÁ·¼¯ÉÏѵÁ·£¬×îÖÕÑ¡ÔñÁË14¸öµäÐÍ·ÖÀàÆ÷Ä£ÐÍ£¨Îå¸öÂß¼»Ø¹éÄ£ÐÍ¡¢ËĸöÌݶÈÌáÉý¾ö²ßÊ÷Ä£ÐÍ¡¢Îå¸öËæ»úÉÁÖÄ£ÐÍ£©£¬Âß¼»Ø¹éÄ£Ð͵ÄAUC(Area Under Curve )·ÖÊý·Ö²¼ÔÚ0.9109¡«0.9196£»ÌݶÈÌáÉý¾ö²ßÊ÷Ä£Ð͵ÄAUC·Ö²¼ÔÚ0.8756¡«0.9079£»Ëæ»úÉÁÖÄ£Ð͵ÄAUC·Ö²¼ÔÚ0.8782¡«0.9047£¬²¢ÓÃÉÏÊöÈý¸öËã·¨ÔÚÈý¸öÊý¾Ý¼¯ÉÏ·Ö±ðѵÁ·£¬±È½ÏÁ˸÷¸öÄ£ÐÍÔÚÈý¸öÊý¾Ý¼¯ÉϵıíÏÖ¡£Ö¤Ã÷ÁËÌØÕ÷¹¤³ÌµÄ´¦ÀíÔÚµ¥Ò»·ÖÀàÄ£ÐÍÖÐÊǷdz£±ØÒªµÄ¡£Âß¼»Ø¹éÔÚº¬ÓÐgreedyÊý¾Ý¼¯µÄѵÁ·¼¯ÖбíÏÖ²»´í£¬¶øÌݶÈÌáÉý¾ö²ßÊ÷ºÍËæ»úÉÁÖÔÚº¬ÓÐtuplesÊý¾Ý¼¯µÄѵÁ·¼¯ÖбíÏÖ²»´í¡£µ«×ÜÌåÀ´Ëµ£¬Âß¼»Ø¹éÄ£ÐÍ£¬ÔÚijЩѵÁ·¼¯ÉϵıíÏÖÊǽϺõġ£ £¨3£©ÔÚÉÏÊö·ÖÀàÄ£Ð͵Ļù´¡ÉÏ£¬±¾ÎĽéÉÜÁËͶƱ±í¾öºÍstacked generation¼¯³ÉѧϰËã·¨£¬²¢¼¯³ÉÉÏÊö14ÖÖµäÐÍ·ÖÀàÆ÷Ä£ÐÍ£¬Í¶Æ±±í¾ö¼¯³ÉÄ£Ð͵ÄAUC´ïµ½ÁË0.9244£¬Ïà¶ÔÓÚÉÏÊö14¸ö·ÖÀàÆ÷Ä£Ð͵Ä×î´óAUC£¬Ìá¸ßÁË0.0048£¬¶østacked generation¼¯³ÉÄ£Ð͵ÄAUC´ïµ½ÁË0.9247£¬Ìá¸ßÁË0.0051¡£ÊµÑé±íÃ÷£¬ÔËÓü¯³ÉѧϰËã·¨Ìá¸ßÁË×îÖÕÄ£Ð͵ķÖÀàÄÜÁ¦¡£ |
» ²ÂÄãϲ»¶
Ò»Ö¾Ô¸¶«»ª´óѧ¿ØÖÆÑ§Ë¶320Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
¿¼Ñл¯Ñ§Ñ§Ë¶µ÷¼Á£¬Ò»Ö¾Ô¸985
ÒѾÓÐ7È˻ظ´
333Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
»¯Ñ§¹¤³Ì321·ÖÇóµ÷¼Á
ÒѾÓÐ21È˻ظ´
0703»¯Ñ§µ÷¼Á
ÒѾÓÐ15È˻ظ´
0703»¯Ñ§µ÷¼Á £¬Áù¼¶Òѹý£¬ÓпÆÑоÀú
ÒѾÓÐ14È˻ظ´
326Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
311Çóµ÷¼Á
ÒѾÓÐ13È˻ظ´
311Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
²ÄÁÏÓ뻯¹¤£¨0856£©304ÇóBÇøµ÷¼Á
ÒѾÓÐ7È˻ظ´
²Ó²ÓÃÃ
ÖÁ×ðľ³æ (ÖøÃûдÊÖ)
- ·ÒëEPI: 68
- Ó¦Öú: 135 (¸ßÖÐÉú)
- ¹ó±ö: 1.097
- ½ð±Ò: 14467.1
- É¢½ð: 3921
- ºì»¨: 102
- ɳ·¢: 3
- Ìû×Ó: 2121
- ÔÚÏß: 396.8Сʱ
- ³æºÅ: 1783324
- ×¢²á: 2012-04-27
- ÐÔ±ð: GG
- רҵ: »·¾³¹¤³Ì
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
lionel0822(RXMCDM´ú·¢): ½ð±Ò+40, ¶àлӦÖú£¡ 2015-10-04 19:23:12
lionel0822(RXMCDM´ú·¢): ½ð±Ò+40, ¶àлӦÖú£¡ 2015-10-04 19:23:12
|
At present, the main control mechanism of access permissions are: DAC(Discretionary Access Control)¡¢MAC(Mandatory Access Control)¡¢RBAC(Role- based Access Control). A new method that establish a automation configuration model of access permissions using machine learning algorithms was introduced in this paper. Recently, more and more scholars have focused on original data processing in machine learning field, due to that the better effects would be received using the same machine learning algorithms base on that more data and features hidden in the original data sets can be dig by feature engineering methods. Many new combinations consisted of data sets and feature sets were created base on the original data sets. This paper was introduced several machine learning algorithms, including the logistic regression, gradient boost decision tree and random forest. Many classification models were produced by using the three above algorithms in data sets and feature sets¡¯ combinations. Some commonly used ensemble learning algorithm based on several above classification models, which are grouped by using two ensemble learning algorithm soon afterwards. Specifically speaking, The main contributions of this paper are as follows: (1) 4 data sets and 5 feature sets were generated base on the original data sets. Several mathematical treatment methods were introduced and selectively applied in data sets and feature sets, especially in the process of greedy data sets, subset regression was selected from tedious data sets using feature selection algorithm which greed to choose before. (2)The logistic regression, gradient boost decision tree and random forest were introduced in this study. 14 typical classification models( 5 logistic regression, 4 gradient boost decision tree and 5 random forest) were selected base on training in different training sets. The AUC(Area Under Curve ) distribution for logistic regression, gradient boost decision tree and random forest were 0.9109¡«0.9196, 0.8756¡«0.9079 and 0.8782¡«0.9047, respectively. Then, used above three algorithms training in three data sets separately to compare the performance of each model to prove the very necessary of feature engineering in single classification model. Logistic regression showed a good performance in training of greedy data sets, while gradient boost decision tree and random forest showed a better performance in training of tuples data sets. But generally speaking, logistic regression showed better in some training sets. (3)This paper introduced voting ensemble learning algorithm and stacked generation ensemble learning algorithm base on above classification models, and integrated above 14 typical classification models. The AUC distribution for voting reached 0.9244, 0.0048 higher than the biggest AUC of above 14 classification models, moreover, The AUC distribution for stacked generation was 0.9247, advanced 0.0051. Results showed that the classification capability of final model was improved by using ensemble Learning Algorithm. |

2Â¥2015-04-10 00:43:01













»Ø¸´´ËÂ¥