An intrusion detection algorithm based on data streams mining and cognitive computing

被引:0
|
作者
Li, Jianxin [1 ]
Cao, Wenliang [1 ]
Huang, Jinyu [2 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
关键词
Cognitive computing; Closed frequent item mining; Intrusion detection; Data streams; EFFICIENT; ENCRYPTION; ITEMSETS; SYSTEMS;
D O I
10.1007/s12652-020-02543-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
引用
收藏
页码:153 / 153
页数:14
相关论文
共 50 条
  • [21] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [22] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [23] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [24] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
  • [25] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [26] Design of Intrusion Detection Model Based on Data Mining Technology
    Li Yin-huan
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 571 - 574
  • [27] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [28] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [29] Design of data mining-based intrusion detection system
    Su, MD
    Liu, DQ
    Li, YF
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, : 93 - 95
  • [30] Intrusion Detection System Based on data mining for Host Log
    Zhu, Ming
    Huang, ZiLi
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1742 - 1746