Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor

被引:5
作者
Ghosh, Partha [1 ]
Saha, Akash [1 ]
Phadikar, Santanu [2 ]
机构
[1] Netaji Subhash Engn Coll, Kolkata 700152, India
[2] Maulana Abul Kalam Azad Univ Technol, Kolkata 700064, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Cloud Computing; Instance Selection; Intrusion Detection System (IDS); NSL-KDD Dataset; Reverse Nearest Neighbor Reduction (RNNR); ALGORITHM;
D O I
10.1016/j.procs.2016.06.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is the distribution of computing resources over the Internet. A shared pool of resources, including data storage space, computer processing power and applications are provided by Cloud computing. In spite of being attractive, it challenges with new security threats when it comes to deploying an Intrusion Detection System (IDS) in Cloud environment. It requires a lot of time to process the Cloud dataset and produce proper classification strategy. A Penalty-Reward based instance selection method to reduce the Cloud dataset is proposed here. Using this method all the noisy and boundary instances are removed from the training dataset. After that Reverse Nearest Neighbor Reduction (RNNR) method is applied on the remaining instances to select all relevant instances from them. This helps to reduce the training time as well as to produce better classification accuracy for IDS. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:82 / 89
页数:8
相关论文
共 25 条
  • [1] [Anonymous], 2014, Cloud Computing: Paradigms and Technologies in Inter-Cooperative Collective Intelligence: Techniques and Applications, DOI DOI 10.1007/978-3-642-35016-0_2
  • [2] Ensembles of instance selection methods based on feature subset
    Blachnik, Marcin
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 18TH ANNUAL CONFERENCE, KES-2014, 2014, 35 : 388 - 396
  • [3] Bloem M, 2006, IEEE DECIS CONTR P, P6285
  • [4] Dai BR, 2011, LECT NOTES ARTIF INT, V6634, P1, DOI 10.1007/978-3-642-20841-6_1
  • [5] Fayyad U., 1996, ADV KNOWLEDGE DISCOV, P82
  • [6] Analyzing the energy-time trade-off in high-performance computing applications
    Freeh, Vincent W.
    Lowenthal, David K.
    Pan, Feng
    Kappiah, Nandini
    Springer, Rob
    Rountree, Barry L.
    Femal, Mark E.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (06) : 835 - 848
  • [7] Democratic instance selection: A linear complexity instance selection algorithm based on classifier ensemble concepts
    Garcia-Osorio, Cesar
    de Haro-Garcia, Aida
    Garcia-Pedrajas, Nicolas
    [J]. ARTIFICIAL INTELLIGENCE, 2010, 174 (5-6) : 410 - 441
  • [8] GATES GW, 1972, IEEE T INFORM THEORY, V18, P431, DOI 10.1109/TIT.1972.1054809
  • [9] Ghosh P., 2014, IOSR J COMPUT ENG, V16, P16, DOI DOI 10.9790/0661-16471626
  • [10] An Efficient Cloud Network Intrusion Detection System
    Ghosh, Partha
    Mandal, Abhay Kumar
    Kumar, Rupesh
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 91 - 99