Intrusion detection and performance simulation based on improved sequential pattern mining algorithm
- PDF / 1,399,768 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 31 Downloads / 169 Views
(0123456789().,-volV)(0123456789(). ,- volV)
Intrusion detection and performance simulation based on improved sequential pattern mining algorithm Yazi Wang1 • Yingbo Liang2 • Huaibo Sun3
•
Yuankun Ma4
Received: 13 September 2019 / Revised: 27 April 2020 / Accepted: 13 May 2020 Ó Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Traditional network intrusion detection algorithm is based on pattern matching, which has made great progress in network intrusion detection system, but the efficiency of this algorithm for data packet matching is quite low. With the rapid increase of Internet scale and capacity, the general information security problem appears, and it brought hidden danger for an open network security. In this paper, the author analyse the intrusion detection and performance simulation based on improved sequential pattern mining algorithm. We integrate the data mining algorithms to implement the IDS, and the simulation result reflects the effectiveness of the methodology. The simulation shows that when minimum support is very small, PrefixSpan running time running a lot less time than other algorithm, and the difference between the two is obvious. Due to the mining algorithm of the relative independence of intrusion detection system, algorithm does not depend on the specific data and specific system, so the intrusion detection system based on data mining to data source requirement is very low. Keywords Pattern mining algorithm Data clustering Intrusion detection External network attacks
1 Introduction In the past decades, information technology has turned the world over and changed the whole world. Information in people’s production and play an increasingly important role in life, people increasingly rely on information technology based products and created on the basis of the information technology of the information industry has become an important pillar industry of the world economy [1]. With the rapid increase of Internet scale and capacity, caused of complicated equipment and management of complications, it brought endless for an open network & Huaibo Sun [email protected] 1
School of Mathematics and Statistics, ZhouKou Normal University, Zhoukou, China
2
College of Mechanical and Electrical Engineering, ZhouKou Normal University, Zhoukou, China
3
School of Mathematics and Statistics, Fuyang Normal University, Fuyang, China
4
College of Network Engineering, ZhouKou Normal University, Zhoukou, China
security hidden danger, the general information security problem appears, showed more deteriorating trend in recent years, countries around the world to produce the huge economic threat, so the information security has become the modern world is increasingly attach importance to research an important topic [2, 3]. In the Fig. 1, we show the statistical data of the information security forms. As for the essential technique for the information security enhancement, the data mining is the most important one. Data mining algorithms can be accurate mean coding is
Data Loading...