An intrusion detection algorithm based on data streams mining and cognitive computing

被引:0
|
作者
Li, Jianxin [1 ]
Cao, Wenliang [1 ]
Huang, Jinyu [2 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
关键词
Cognitive computing; Closed frequent item mining; Intrusion detection; Data streams; EFFICIENT; ENCRYPTION; ITEMSETS; SYSTEMS;
D O I
10.1007/s12652-020-02543-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
引用
收藏
页码:153 / 153
页数:14
相关论文
共 50 条
  • [31] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [32] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
  • [33] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [34] Research on the data-mining-based intrusion detection technology
    Li, Guobin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 515 - 518
  • [35] Data Mining Based Advanced Algorithm for Intrusion Detections in Communication Networks
    Bhosale, Karuna S.
    Nenova, Maria
    Iliev, Georgi
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 297 - 300
  • [36] The Application of High Dimensional Data Mining Based on Big Data to Intrusion Detection
    Liu, Jinhua
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 169 - 171
  • [37] An Ensemble Classifier Algorithm for Mining data Streams Based on Concept Drift
    Geng, Yushui
    Zhang, Jianguo
    2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2017, : 227 - 230
  • [38] Efficient Data Streams Based Closed Frequent Itemsets Mining Algorithm
    Tan, Jun
    ADVANCES IN CIVIL ENGINEERING II, PTS 1-4, 2013, 256-259 : 2910 - 2913
  • [39] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987
  • [40] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377