Efficient classification using parallel and scalable compressed model and its application on intrusion detection

作者: Tieming Chen , Xu Zhang , Shichao Jin , Okhee Kim

DOI: 10.1016/J.ESWA.2014.04.009

关键词: Data miningVolume (compression)Affinity propagationSpeedupIntrusion detection systemScalabilityProcess (computing)Reduction (complexity)Compression (functional analysis)Computer science

摘要: Abstract In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed this paper which combines horizontal compression with vertical compression. OneR utilized as for attribute reduction, and affinity propagation employed select small representative exemplars from large training data. As be able computationally compress the larger volume data scalability, MapReduce based parallelization approach then implemented evaluated each step process abovementioned, on common but efficient methods can directly used. Experimental application study two publicly available datasets KDD99 CMDC2012, demonstrates that using effectively speed up detection procedure at 184 times, most importantly cost minimal accuracy difference less than 1% average.

参考文章(51)
Yuxin Meng, Lam-for Kwok, Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection Springer, Berlin, Heidelberg. pp. 573- 584 ,(2011) , 10.1007/978-3-642-25658-5_68
Hülya Behret, Başar Öztayşi, Cengiz Kahraman, A Fuzzy Inference System for Supply Chain Risk Management Springer, Berlin, Heidelberg. pp. 429- 438 ,(2011) , 10.1007/978-3-642-25658-5_52
Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis, Spiros Antonatos, Gnort: High Performance Network Intrusion Detection Using Graphics Processors recent advances in intrusion detection. pp. 116- 134 ,(2008) , 10.1007/978-3-540-87403-4_7
Mingjun Wei, Lichun Xia, Jianguo Jin, Chen Chen, Research of Intrusion Detection Based on Clustering Analysis Springer, New York, NY. pp. 1973- 1979 ,(2014) , 10.1007/978-1-4614-3872-4_252
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Jingping Song, Zhiliang Zhu, Peter Scully, Chris Price, Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification International Symposium on Cyberspace Safety and Security. pp. 299- 307 ,(2013) , 10.1007/978-3-319-03584-0_22
Wei Wang, Xiangliang Zhang, Georgios Pitsilis, Abstracting audit data for lightweight intrusion detection international conference on information systems security. pp. 201- 215 ,(2010) , 10.1007/978-3-642-17714-9_15
Tadeusz Pietraszek, Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection recent advances in intrusion detection. pp. 102- 124 ,(2004) , 10.1007/978-3-540-30143-1_6
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
KM Faraoun, A Boukelif, None, Neural Networks Learning Improvement using the K-Means Clustering Algorithm to Detect Network Intrusions World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering. ,vol. 1, pp. 3138- 3145 ,(2007)