Skip to main content
Log in

An intrusion detection algorithm based on data streams mining and cognitive computing

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Agrawal R, Srikant R (1994). Fast algorithms for mining association rules in large databases. In: VLDB '94: Proceedings of the 20th international conference on very large data bases, pp 487–499, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc.

  • Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania.

  • Alves T et al (2018) Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embedded Syst. Lett 10:99–102

    Google Scholar 

  • Bay V, Tzung PH, Bac L (2012) DBV-Miner: a dynamic bit-vector approach for fast mining frequent closed itemsets. Expert Syst Appl 8(39):7196–7206

    Google Scholar 

  • Benjamin D, Russel P, Asif NM (2020) Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining. Expert Syst Appl 152(8):321–335

    Google Scholar 

  • Bhati BS, Rai CS (2020) Analysis of support vector machine-based intrusion detection techniques. Arab J Sci Eng 45(4):2371–2383

    Google Scholar 

  • Bhati BS, Rai CS, Balamurugan B, Al-Turjman F (2020) An intrusion detection scheme based on the ensemble of discriminant classifiers. Comput Electr Eng 86:106742

    Google Scholar 

  • Chen CM, Wang KH, Yeh KH, Xiang KB, Wu TY (2019a) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Hum Comput 10(8):3133–3142

    Google Scholar 

  • Chen CM, Xiang B, Liu Y, Wang KH (2019b) A secure authentication protocol for internet of vehicles. IEEE Access 7(1):12047–12057

    Google Scholar 

  • Cheng H, Su Z, Xiong N et al (2016) Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf Sci 329:461–477

    MATH  Google Scholar 

  • Cheng J, Ke YP, Nq W (2008) Maintaining frequent closed itemsets over a sliding window. J Intell Inf Syst 31(1):191–215

    Google Scholar 

  • Cheng T, Jiang H, Wang F, Hua Y, Feng D, Guo W et al (2019) Using high-bandwidth networks efficiently for fast graph computation. IEEE Trans Parallel Distrib Syst 30(5):1170–1183

    Google Scholar 

  • ChiY, Wang H,Yu P (2004). MOMENT: maintaining closed frequent itemsets over a data stream sliding window. In: Proceedings of the 2004 IEEE international conference on data mining. TCCI Press, pp 59–66

  • Daniel B, Julia C, Sushil J et al (2001) ADAM: a Testbed for exploring the use of data mining in intrusion detection. SIGMOD 30(4):15–24

    Google Scholar 

  • Ertoz L, Eilertson E, Lazarevic A, Tan P, Srivastava J, Kumar V, Dokas P (2004) The MINDS - Minnesota intrusion detection system. In: Data mining - Next generation challenges and future directions, pp 1–21

  • Guo W, Lin B et al (2018) Cost-driven scheduling for deadline-based workflow in Multiclouds. IEEE Trans Netw Serv Manag 15(4):1571–1585

    Google Scholar 

  • Guo Y, Du L, Chen J (2019) Max-margin multi-scale convolutional factor analysis model with application to image classification. Expert Syst Appl 2019(133):21–33

    Google Scholar 

  • Huang GL, Wang LB, Ren JD (2009) A frequent closed itemset mining algorithm for data streams based on sliding windows. J Comput Res Dev 46(z2):1738–1743

    Google Scholar 

  • Huang SK, Lei K (2020) IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw 105(8):350–368

    Google Scholar 

  • JiangNJ, Gruen W (2006). CFI-stream: mining closed frequent itemsets in data streams. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, ACM Press, pp 592–597

  • Lee JC, Wang HY, Schifano ED (2020) Online updating method to correct for measurement error in big data streams. Comput Stat Data Anal 149(8):137–150

    MathSciNet  MATH  Google Scholar 

  • Li H-F, Lee S-Y (2009) Mining frequent itemsets over data streams using efficient window sliding techniques. Expert Syst Appl 36(2):1466–1477

    Google Scholar 

  • Liu G, Chen Z, Zhuang Z, Guo W et al (2020) A unified algorithm based on HTS and self-adapting PSO for the construction of octagonal and rectilinear SMT. Soft Comput 24(6):3943–3961

    Google Scholar 

  • Liu Y, Li Y, Man H, Jiang W (2007) A hybrid data mining anomaly detection technique in ad hoc networks. Int J Wirel Mobile Comput 2(1):37–46

    Google Scholar 

  • Luo F, Guo W et al (2016) A multi-label classification algorithm based on kernel extreme learning machine. Neurocomputing 260:313–320

    Google Scholar 

  • Ma T, Liu Q, Cao J, Tian Y, Abdullah AD, LGIEM MR (2020) Global and local node influence based community detection. Future Gener Comput Syst 105:533–546

    Google Scholar 

  • Maciej G, Karolina K, Tomasz Z (2020) Hybrid short term prediction to address limited timeliness of public transport data streams. Neurocomputing 391:305–317

    Google Scholar 

  • Maia J, Severiano CA, Guimarães FG, Castro CLD, Lemos AP, Galindo JCF, Cohen MW (2020) Evolving clustering algorithm based on mixture of typicalities for stream data mining. Future Gener Comput Syst 106(5):672–684

    Google Scholar 

  • Mao GJ, Song DJ (2009) Intrusion detection model and algorithm based on multidimensional data flow mining technology. Comput Res Dev 46(4):602–609

    Google Scholar 

  • Miller Z, Hu W (2012) Data stream subspace clustering for anomalous network packet detection. J Inf Secur 3(3):215–223

    Google Scholar 

  • Nam H, Yun U, Yoon E, Lin JCW (2020) Efficient approach of recent high utility stream pattern mining with indexed list structure and pruning strategy considering arrival times of transactions. Inf Sci 529(8):1–27

    MathSciNet  Google Scholar 

  • Niu Y, Chen J, Guo W (2018) Meta-metric for saliency detection evaluation metrics based on application preference. Multimed Tools Appl 77(20):26351–26369

    Google Scholar 

  • Pan JS, Hu P, Chu S-C (2019a) Novel parallel heterogeneous meta-heuristic and its communication strategies for the prediction of wind power. Processes 7(11):845. https://doi.org/10.3390/pr7110845

    Article  Google Scholar 

  • Pan JS, Lee CY et al (2019b) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr Syst 27(7):1614–1622

    Google Scholar 

  • Ranganath BN, Murty MN (2008) Stream-close: fast mining of closed frequent itemsets in high speed data streams. In: Proceeding of 2008 IEEE international conference on data mining workshops, pp 516–525

  • Salvatore JS, Lee W-K, Philip KC et al (2001) Data mining-based intrusion detectors: an overview of the Columbia IDS Project. SIGMOD 30(4):5–14

    Google Scholar 

  • Schmidt DA, Khan MS, Bennett BT (2020) Spline-based intrusion detection for VANET utilizing knot flow classification. Internet Technol Lett 3(3):699–713

    Google Scholar 

  • Shen Z, Patrick P, Lee C, Shu J, Guo W (2018) Encoding-aware data placement for efficient degraded reads in XOR-coded storage systems: algorithms and evaluation. IEEE Trans Parallel Distrib Syst 29(12):2757–2770

    Google Scholar 

  • Sun ZJ, Duncan A, Kim Y, Zeigler K (2020) Seeking frequent episodes in baseline data of in-situ decommissioning (ISD) Sensor Network Test Bed with temporal data mining tools. Prog Nuclear Energy 125(6):501–516

    Google Scholar 

  • Wang S, Guo W (2017) SparseMulti-graph embedding for multimodal feature representation. IEEE Trans Multimed 19(7):1454–1466

    Google Scholar 

  • Wang JW, Wu SH, Qu ZG (2019) CFMoment: algorithm for mining data flow frequent closed itemsets. J Appl Sci 37(3):389–397

    Google Scholar 

  • Wu TY, Chen CM et al (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28

    Google Scholar 

  • Wu ZD, Wang JJ, Hu LQ, Zhang Z, Wu H (2020) A network intrusion detection method based on semantic re-encoding and deep learning. J Netw Comput Appl 164(8):56–63. https://doi.org/10.1016/j.jnca.2020.102688

    Article  Google Scholar 

  • Yang LH, Wang YM, Su Q et al (2016) Multi-attribute search framework for optimizing extended belief rule-based systems. Inf Sci 370:159–183

    Google Scholar 

Download references

Acknowledgement

This paper is supported by 2020 School-level Quality Engineering of Dongguan Polytechnic (JGYB202010), Dongguan social science and technology development project (2020507156694), Dongguan social science and technology development project (2020507156684), 2017 Guangdong Provincial Department of Education Youth Innovation Talents Project (2017GkQNCX119), 2019 School-level Research Fund Key Project of Dongguan Polytechnic (2019a17).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianxin Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Cao, W. & Huang, J. An intrusion detection algorithm based on data streams mining and cognitive computing. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02543-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-020-02543-5

Keywords

Navigation