An intrusion detection algorithm based on data streams mining and cognitive computing

被引:0
|
作者
Li, Jianxin [1 ]
Cao, Wenliang [1 ]
Huang, Jinyu [2 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
关键词
Cognitive computing; Closed frequent item mining; Intrusion detection; Data streams; EFFICIENT; ENCRYPTION; ITEMSETS; SYSTEMS;
D O I
10.1007/s12652-020-02543-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
引用
收藏
页码:153 / 153
页数:14
相关论文
共 50 条
  • [1] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [2] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of DongHua University, 2004, (05) : 88 - 92
  • [3] Intrusion detection model based on mining multi-dimension data streams
    Mao, Guojun
    Zong, Dongjun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 602 - 609
  • [4] Power information network intrusion detection based on data mining algorithm
    Xiaojun Zuo
    Ze Chen
    Limian Dong
    Jie Chang
    Botao Hou
    The Journal of Supercomputing, 2020, 76 : 5521 - 5539
  • [5] Power information network intrusion detection based on data mining algorithm
    Zuo, Xiaojun
    Chen, Ze
    Dong, Limian
    Chang, Jie
    Hou, Botao
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
  • [6] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [7] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283
  • [8] Granular computing based intrusion detection model upon network monitor data streams
    Zhu, Xiaodong
    Huang, Zhiqiu
    Zhang, Junhua
    Yang, Shuqun
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 431 - 435
  • [9] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [10] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462