Strategies for data stream mining method applied in anomaly detection

被引:13
|
作者
Sun, Ruxia [1 ]
Zhang, Sun [1 ]
Yin, Chunyong [1 ]
Wang, Jin [2 ,3 ]
Min, Seungwook [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Jiangsu Engn Ctr Network Monitoring, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[3] Yangzhou Univ, Coll Informat Engn, Yangzhou, Jiangsu, Peoples R China
[4] Sangmyung Univ, Dept Comp Sci, Seoul, South Korea
基金
中国国家自然科学基金;
关键词
Anomaly detection; Data stream; Clustering; Concept drift; DETECTION SYSTEM; ALGORITHMS;
D O I
10.1007/s10586-018-2835-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection, which is a method of intrusion detection, detects anomaly behaviors and protects network security. Data mining technology has been integrated to improve the performance of anomaly detection and some algorithms have been improved for anomaly detection field. We think that most data mining algorithms are analyzed on static data sets and ignore the influence of dynamic data streams. Data stream is the potentially unbounded, ordered sequence of data objects which arrive over time. The entire data objects cannot be stored and they need to be handled in one-time scanning. The data distribution of data stream may change over time and this phenomenon is called concept drift. The properties of data stream make analysis method different from the method based on data set and the analysis model is required to be updated immediately when concept drift occurs. In this paper, we summarize the characteristics of data stream, compare the difference between data stream and data set, discuss the problems of data stream mining and propose some corresponding strategies.
引用
收藏
页码:399 / 408
页数:10
相关论文
共 50 条
  • [21] Method for anomaly detection in network security event stream
    Li, Run-Heng
    Jia, Yan
    Tongxin Xuebao/Journal on Communications, 2009, 30 (12): : 27 - 35
  • [22] An Anomaly Detection Method for Stateful Stream Processing System
    Chang, Guanghui
    Zhao, Lu
    Liu, Jun
    Li, Peizhen
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 196 - 199
  • [23] A dynamic anomaly detection method of building energy consumption based on data mining technology
    Lei, Lei
    Wu, Bing
    Fang, Xin
    Chen, Li
    Wu, Hao
    Liu, Wei
    ENERGY, 2023, 263
  • [24] A Data Mining Method Using Deep Learning for Anomaly Detection in Cloud Computing Environment
    Gao, Jin
    Liu, Jiaquan
    Guo, Sihua
    Zhang, Qi
    Wang, Xinyang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [25] Algorithm Optimization of Anomaly Detection Based on Data Mining
    Zhang, Lei
    Chen, Yong
    Liao, Shaowen
    2018 10TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2018, : 402 - 404
  • [26] The Coal Production Anomaly Detection Based on Data Mining
    Wang Guanghui
    Kuang Yali
    Wang Zhangguo
    MEASUREMENT TECHNOLOGY AND ITS APPLICATION, PTS 1 AND 2, 2013, 239-240 : 744 - 748
  • [27] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [28] Matrix Profile data mining for BGP anomaly detection
    Scott, Ben A.
    Johnstone, Michael N.
    Szewczyk, Patryk
    Richardson, Steven
    COMPUTER NETWORKS, 2024, 242
  • [29] Anomaly Detection Techniques in Data Mining-A Review
    Lakshmi, K. N.
    Neema, N.
    Muddasir, N. Mohammed
    Prashanth, M., V
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 799 - 804
  • [30] Augmented Query Strategies for Active Learning in Stream Data Mining
    Faisal, Mustafa Amir
    Aung, Zeyar
    Woon, Wei Lee
    Svetinovic, Davor
    NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, 2014, 8836 : 431 - 438