An intrusion detection algorithm based on data streams mining and cognitive computing

被引:0
|
作者
Li, Jianxin [1 ]
Cao, Wenliang [1 ]
Huang, Jinyu [2 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
关键词
Cognitive computing; Closed frequent item mining; Intrusion detection; Data streams; EFFICIENT; ENCRYPTION; ITEMSETS; SYSTEMS;
D O I
10.1007/s12652-020-02543-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
引用
收藏
页码:153 / 153
页数:14
相关论文
共 50 条
  • [1] Granular computing based intrusion detection model upon network monitor data streams
    Zhu, Xiaodong
    Huang, Zhiqiu
    Zhang, Junhua
    Yang, Shuqun
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 431 - 435
  • [2] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [3] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of DongHua University, 2004, (05) : 88 - 92
  • [4] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [5] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283
  • [6] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462
  • [7] Intrusion Detection Using Neural Networks: A Grid Computing Based Data Mining Approach
    Castellano, Marcello
    Mastronardi, Giuseppe
    Tarricone, Gianfranco
    NEURAL INFORMATION PROCESSING, PT 2, PROCEEDINGS, 2009, 5864 : 777 - 785
  • [8] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [9] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [10] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38