An intrusion detection algorithm based on data streams mining and cognitive computing

被引:0
作者
Li, Jianxin [1 ]
Cao, Wenliang [1 ]
Huang, Jinyu [2 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Dongguan Hosp Integrated Tradit Chinese & Western, Facial Clin, Dongguan 523000, Peoples R China
关键词
Cognitive computing; Closed frequent item mining; Intrusion detection; Data streams; EFFICIENT; ENCRYPTION; ITEMSETS; SYSTEMS;
D O I
10.1007/s12652-020-02543-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
引用
收藏
页码:153 / 153
页数:14
相关论文
共 50 条
  • [41] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [42] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [43] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [44] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [45] A GP-based ensemble classification framework for time-changing streams of intrusion detection data
    Folino, Gianluigi
    Pisani, Francesco Sergio
    Pontieri, Luigi
    SOFT COMPUTING, 2020, 24 (23) : 17541 - 17560
  • [46] Adaptive intrusion detection: A data mining approach
    Lee, WK
    Stolfo, SJ
    Mok, KW
    ARTIFICIAL INTELLIGENCE REVIEW, 2000, 14 (06) : 533 - 567
  • [47] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [48] Adaptive Intrusion Detection: A Data Mining Approach
    Wenke Lee
    Salvatore J. Stolfo
    Kui W. Mok
    Artificial Intelligence Review, 2000, 14 : 533 - 567
  • [49] A GP-based ensemble classification framework for time-changing streams of intrusion detection data
    Gianluigi Folino
    Francesco Sergio Pisani
    Luigi Pontieri
    Soft Computing, 2020, 24 : 17541 - 17560
  • [50] An efficient mining algorithm for frequent pattern in intrusion detection
    Li, QH
    Xiong, JJ
    Yang, HB
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 138 - 142