Abstract
With the emergence of large-volume and high-speed streaming data, traditional techniques for mining closed frequent itemsets has become inefficient. Online mining of closed frequent itemsets over streaming data is one of the most important issues in data streams minging. In view of the low efficiency of traditional closed frequent item data mining, a combined data structure based on the principle of cognitive computing is proposed, that is, combining the effective bit first with the extended dictionary frequent item list to form a mixed data structure that can identify the closed frequent information in data streams. At the same time, a variety of pruning strategies based on cognitive computing are proposed to avoid the generation of a large number of intermediate itemsets and to remove the non closed frequent term sets from the Hash Table of Closed Itemsets (CIHT). Closed Frequent Itemset Deletion and Search Strategy (CFIDWSS) is used to effectively add or remove the closed frequent itemsets, so as to greatly reduce the search space and improve the user response speed. The proposed algorithm solves the problem of low efficiency of data streams mining of closed frequent items. On the basis of the above algorithms, this paper proposes a new intrusion detection model. Through the mining of normal or abnormal patterns of data stream information, the corresponding database of network access pattern is established. Then the database is used to detect the intrusion online in real time and improve the detection accuracy of the system. Theoretical and experimental results show that the proposed algorithm and intrusion detection system have good performance.
Similar content being viewed by others
References
Agrawal R, Srikant R (1994). Fast algorithms for mining association rules in large databases. In: VLDB '94: Proceedings of the 20th international conference on very large data bases, pp 487–499, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc.
Anderson JP (1980) Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania.
Alves T et al (2018) Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embedded Syst. Lett 10:99–102
Bay V, Tzung PH, Bac L (2012) DBV-Miner: a dynamic bit-vector approach for fast mining frequent closed itemsets. Expert Syst Appl 8(39):7196–7206
Benjamin D, Russel P, Asif NM (2020) Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining. Expert Syst Appl 152(8):321–335
Bhati BS, Rai CS (2020) Analysis of support vector machine-based intrusion detection techniques. Arab J Sci Eng 45(4):2371–2383
Bhati BS, Rai CS, Balamurugan B, Al-Turjman F (2020) An intrusion detection scheme based on the ensemble of discriminant classifiers. Comput Electr Eng 86:106742
Chen CM, Wang KH, Yeh KH, Xiang KB, Wu TY (2019a) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Hum Comput 10(8):3133–3142
Chen CM, Xiang B, Liu Y, Wang KH (2019b) A secure authentication protocol for internet of vehicles. IEEE Access 7(1):12047–12057
Cheng H, Su Z, Xiong N et al (2016) Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf Sci 329:461–477
Cheng J, Ke YP, Nq W (2008) Maintaining frequent closed itemsets over a sliding window. J Intell Inf Syst 31(1):191–215
Cheng T, Jiang H, Wang F, Hua Y, Feng D, Guo W et al (2019) Using high-bandwidth networks efficiently for fast graph computation. IEEE Trans Parallel Distrib Syst 30(5):1170–1183
ChiY, Wang H,Yu P (2004). MOMENT: maintaining closed frequent itemsets over a data stream sliding window. In: Proceedings of the 2004 IEEE international conference on data mining. TCCI Press, pp 59–66
Daniel B, Julia C, Sushil J et al (2001) ADAM: a Testbed for exploring the use of data mining in intrusion detection. SIGMOD 30(4):15–24
Ertoz L, Eilertson E, Lazarevic A, Tan P, Srivastava J, Kumar V, Dokas P (2004) The MINDS - Minnesota intrusion detection system. In: Data mining - Next generation challenges and future directions, pp 1–21
Guo W, Lin B et al (2018) Cost-driven scheduling for deadline-based workflow in Multiclouds. IEEE Trans Netw Serv Manag 15(4):1571–1585
Guo Y, Du L, Chen J (2019) Max-margin multi-scale convolutional factor analysis model with application to image classification. Expert Syst Appl 2019(133):21–33
Huang GL, Wang LB, Ren JD (2009) A frequent closed itemset mining algorithm for data streams based on sliding windows. J Comput Res Dev 46(z2):1738–1743
Huang SK, Lei K (2020) IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw 105(8):350–368
JiangNJ, Gruen W (2006). CFI-stream: mining closed frequent itemsets in data streams. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, ACM Press, pp 592–597
Lee JC, Wang HY, Schifano ED (2020) Online updating method to correct for measurement error in big data streams. Comput Stat Data Anal 149(8):137–150
Li H-F, Lee S-Y (2009) Mining frequent itemsets over data streams using efficient window sliding techniques. Expert Syst Appl 36(2):1466–1477
Liu G, Chen Z, Zhuang Z, Guo W et al (2020) A unified algorithm based on HTS and self-adapting PSO for the construction of octagonal and rectilinear SMT. Soft Comput 24(6):3943–3961
Liu Y, Li Y, Man H, Jiang W (2007) A hybrid data mining anomaly detection technique in ad hoc networks. Int J Wirel Mobile Comput 2(1):37–46
Luo F, Guo W et al (2016) A multi-label classification algorithm based on kernel extreme learning machine. Neurocomputing 260:313–320
Ma T, Liu Q, Cao J, Tian Y, Abdullah AD, LGIEM MR (2020) Global and local node influence based community detection. Future Gener Comput Syst 105:533–546
Maciej G, Karolina K, Tomasz Z (2020) Hybrid short term prediction to address limited timeliness of public transport data streams. Neurocomputing 391:305–317
Maia J, Severiano CA, Guimarães FG, Castro CLD, Lemos AP, Galindo JCF, Cohen MW (2020) Evolving clustering algorithm based on mixture of typicalities for stream data mining. Future Gener Comput Syst 106(5):672–684
Mao GJ, Song DJ (2009) Intrusion detection model and algorithm based on multidimensional data flow mining technology. Comput Res Dev 46(4):602–609
Miller Z, Hu W (2012) Data stream subspace clustering for anomalous network packet detection. J Inf Secur 3(3):215–223
Nam H, Yun U, Yoon E, Lin JCW (2020) Efficient approach of recent high utility stream pattern mining with indexed list structure and pruning strategy considering arrival times of transactions. Inf Sci 529(8):1–27
Niu Y, Chen J, Guo W (2018) Meta-metric for saliency detection evaluation metrics based on application preference. Multimed Tools Appl 77(20):26351–26369
Pan JS, Hu P, Chu S-C (2019a) Novel parallel heterogeneous meta-heuristic and its communication strategies for the prediction of wind power. Processes 7(11):845. https://doi.org/10.3390/pr7110845
Pan JS, Lee CY et al (2019b) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr Syst 27(7):1614–1622
Ranganath BN, Murty MN (2008) Stream-close: fast mining of closed frequent itemsets in high speed data streams. In: Proceeding of 2008 IEEE international conference on data mining workshops, pp 516–525
Salvatore JS, Lee W-K, Philip KC et al (2001) Data mining-based intrusion detectors: an overview of the Columbia IDS Project. SIGMOD 30(4):5–14
Schmidt DA, Khan MS, Bennett BT (2020) Spline-based intrusion detection for VANET utilizing knot flow classification. Internet Technol Lett 3(3):699–713
Shen Z, Patrick P, Lee C, Shu J, Guo W (2018) Encoding-aware data placement for efficient degraded reads in XOR-coded storage systems: algorithms and evaluation. IEEE Trans Parallel Distrib Syst 29(12):2757–2770
Sun ZJ, Duncan A, Kim Y, Zeigler K (2020) Seeking frequent episodes in baseline data of in-situ decommissioning (ISD) Sensor Network Test Bed with temporal data mining tools. Prog Nuclear Energy 125(6):501–516
Wang S, Guo W (2017) SparseMulti-graph embedding for multimodal feature representation. IEEE Trans Multimed 19(7):1454–1466
Wang JW, Wu SH, Qu ZG (2019) CFMoment: algorithm for mining data flow frequent closed itemsets. J Appl Sci 37(3):389–397
Wu TY, Chen CM et al (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28
Wu ZD, Wang JJ, Hu LQ, Zhang Z, Wu H (2020) A network intrusion detection method based on semantic re-encoding and deep learning. J Netw Comput Appl 164(8):56–63. https://doi.org/10.1016/j.jnca.2020.102688
Yang LH, Wang YM, Su Q et al (2016) Multi-attribute search framework for optimizing extended belief rule-based systems. Inf Sci 370:159–183
Acknowledgement
This paper is supported by 2020 School-level Quality Engineering of Dongguan Polytechnic (JGYB202010), Dongguan social science and technology development project (2020507156694), Dongguan social science and technology development project (2020507156684), 2017 Guangdong Provincial Department of Education Youth Innovation Talents Project (2017GkQNCX119), 2019 School-level Research Fund Key Project of Dongguan Polytechnic (2019a17).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, J., Cao, W. & Huang, J. An intrusion detection algorithm based on data streams mining and cognitive computing. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02543-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-020-02543-5