An intrusion detection algorithm based on data streams mining and cognitive computing

  • PDF / 1,539,616 Bytes
  • 14 Pages / 595.276 x 790.866 pts Page_size
  • 89 Downloads / 188 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

An intrusion detection algorithm based on data streams mining and cognitive computing Jianxin Li1 · Wenliang Cao1 · Jinyu Huang2 Received: 31 May 2020 / Accepted: 5 September 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance. Keywords  Cognitive computing · Closed frequent item mining · Intrusion detection · Data streams

1 Introduction Driven by emerging applications such as network transactions, phone records, customer click streams, and network streams, data stream mining has been widely studied. Serial arriving transactions are called a data stream. Compared with the data in the traditional static database, the data in the data stream has the following differences (Lee et al. 2020; Guo et al. 2018, 2019; Huang et al. 2019): (1) they are * Jianxin Li [email protected] Wenliang Cao [email protected] Jinyu Huang [email protected] 1



Department of Computer Engineering, Dongguan Polytechnic, Dongguan 523808, China



Facial Clinic, Dongguan Hospital of Integrated Traditional Chinese and Western Medicine, Dongguan 523000, China

2

unlimited, continuous and high-speed; (2) Data in the data streams is open. Its quantity is very large; (3) Data distribution in the streams usually changes over time. Therefore, data streams mining (chi et al. 2004; Jiang et al. 2006; Ranganath and Murty 2008; Li and Lee 2009; Wang et al. 2019; Chen