Title :
Research on Chinese Key Words Mining with Malicious Jamming in English
Author :
Shui, Cao ; Xueguang, Zhou ; Yan, Sun ; Huanguo, Zhang
Author_Institution :
Coll. of Electron. Eng., Naval Univ. of Eng. (NUE), Wuhan, China
Abstract :
With the rapid development of World Wide Web, the Web malicious attackers have taken the initiative jamming in Chinese to transform the form of the key words to be avoided being mined by the software existed. So how to filter the unhealthy Web page quickly and effectively has become the main content of the Web security. Because of the limitation of traditional rigid strings matching on the key words mining in Chinese, people have turned to research flexible string matching. Based on the Zhou-Zhang algorithm and the technique of key words mining in Chinese, this paper designed and realized a key words mining system about malicious jamming in English. The details in the design of the program and the realization of the process are introduced. The experiments prove that more than 98% of the key words about malicious jamming in English in the document could be mined and then be judged whether it is healthy by this system accurately.
Keywords :
Internet; data mining; information filtering; jamming; natural language processing; security of data; string matching; Chinese key word mining system; English; Web page; Web security; World Wide Web; Zhou-Zhang algorithm; malicious jamming; strings matching; Algorithm design and analysis; Application software; Counting circuits; Design engineering; Information filtering; Information filters; Information technology; Jamming; Pattern matching; Prototypes; Chinese information processing; data base technology; keyword mining; malicious jamming in English; network security;
Conference_Titel :
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3600-2
DOI :
10.1109/IFITA.2009.257