Research on E-Commerce Transaction Payment System Based on C4.5 Decision Tree Data Mining Algorithm

被引:0
作者
Xu, Bing [1 ]
Huang, Darong [2 ]
Mi, Bo [2 ]
机构
[1] Chongqing Jiaotong Univ, Sch Econ & Management, Chongqing, Peoples R China
[2] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing, Peoples R China
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2020年 / 35卷 / 02期
关键词
E-Commerce Transactions; C4.5 Decision Tree; Data Mining; Payment System;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, according to the information classification algorithm in data mining, data in the network payment system of e-commerce is mined, forming an effective evaluation of the security of the network payment system. Firstly, the method of network security risk prediction is discussed. Secondly, according to the characteristics of network payment system, the system security index system is analyzed in detail, and the specific application process of the C4.5 Classification Algorithm in security evaluation is discussed. Finally, the data mining process is designed in detail and the corresponding code established. In this paper, data mining theory is applied to the network payment security evaluation system, and an algorithm system is constructed to evaluate the network payment security. The algorithm system realizes the effective evaluation and judgment of the network payment system security as well as warning of potential network security problems, effectively changing the previous way of network security management, and ensures the security and stability of the network payment system is maximized.
引用
收藏
页码:113 / 121
页数:9
相关论文
共 23 条
  • [1] [Anonymous], JINGXI QISHILU
  • [2] COLIDE: a collaborative intrusion detection framework for Internet of Things
    Arshad, Junaid
    Azad, Muhammad Ajmal
    Abdellatif, Mohammad Mahmoud
    Rehman, Muhammad Habib Ur
    Salah, Khaled
    [J]. IET NETWORKS, 2019, 8 (01) : 3 - 14
  • [3] Conway K. D., CUSTOMER RELATION SH
  • [4] A Deep Learning Framework to Enhance Software Defined Networks Security
    Dawoud, Ahmed
    Shahristani, Seyed
    Raun, Chun
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 709 - 714
  • [5] Fu Yue, 2008, COMPUTER ENG DESIGN, P3391
  • [6] Han Zongfen, 2002, J HUAZHONG U SCI TEC, P33
  • [7] Hong Liping, 2017, FUJIAN COMPUTER, V33, P68
  • [8] Li Guangxia, 2008, FUJIAN COMPUTER, P102
  • [9] Li Guangxia, 2014, SOFTWARE GUIDE, V13, P14
  • [10] Li Guangxia, 2011, COAL TECHNOLOGY, V30