Strategies for data stream mining method applied in anomaly detection

被引:13
|
作者
Sun, Ruxia [1 ]
Zhang, Sun [1 ]
Yin, Chunyong [1 ]
Wang, Jin [2 ,3 ]
Min, Seungwook [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Jiangsu Engn Ctr Network Monitoring, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[3] Yangzhou Univ, Coll Informat Engn, Yangzhou, Jiangsu, Peoples R China
[4] Sangmyung Univ, Dept Comp Sci, Seoul, South Korea
基金
中国国家自然科学基金;
关键词
Anomaly detection; Data stream; Clustering; Concept drift; DETECTION SYSTEM; ALGORITHMS;
D O I
10.1007/s10586-018-2835-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection, which is a method of intrusion detection, detects anomaly behaviors and protects network security. Data mining technology has been integrated to improve the performance of anomaly detection and some algorithms have been improved for anomaly detection field. We think that most data mining algorithms are analyzed on static data sets and ignore the influence of dynamic data streams. Data stream is the potentially unbounded, ordered sequence of data objects which arrive over time. The entire data objects cannot be stored and they need to be handled in one-time scanning. The data distribution of data stream may change over time and this phenomenon is called concept drift. The properties of data stream make analysis method different from the method based on data set and the analysis model is required to be updated immediately when concept drift occurs. In this paper, we summarize the characteristics of data stream, compare the difference between data stream and data set, discuss the problems of data stream mining and propose some corresponding strategies.
引用
收藏
页码:399 / 408
页数:10
相关论文
共 50 条
  • [41] Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
    Yang, Yihong
    Xu, Xiaolong
    Wang, Lina
    Zhong, Weiyi
    Yan, Chao
    Qi, Lianyong
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 87 - 91
  • [42] An Efficient Method for Battlefield Information Data Stream Mining
    Wang, Ning
    Wang, Tao
    INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL SCIENCES AND OPTIMIZATION, VOL 1, PROCEEDINGS, 2009, : 723 - 725
  • [43] An anomaly detection and dynamic energy performance evaluation method for HVAC systems based on data mining
    Xu, Yizhe
    Yan, Chengchu
    Shi, Jingfeng
    Lu, Zefeng
    Niu, Xiaofeng
    Jiang, Yanlong
    Zhu, Faxing
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 44
  • [44] An anomaly detection and dynamic energy performance evaluation method for HVAC systems based on data mining
    Xu, Yizhe
    Yan, Chengchu
    Shi, Jingfeng
    Lu, Zefeng
    Niu, Xiaofeng
    Jiang, Yanlong
    Zhu, Faxing
    Sustainable Energy Technologies and Assessments, 2021, 44
  • [45] A Minimum Rare-Itemset-Based Anomaly Detection Method and Its Application on Sensor Data Stream
    Cai, Saihua
    Sun, Ruizhi
    Mu, Huiyu
    Shi, Xiaochen
    Yuan, Gang
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 116 - 130
  • [46] Data mining methods for anomaly detection of HTTP request exploitations
    Wang, XF
    Zhou, JL
    Yu, SS
    Cai, LZ
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 320 - 323
  • [47] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [49] The Research of Network Anomaly Detection Technology Based on Data Mining
    Wu, Chunhong
    Xia, Wenzhong
    Liu, Fengyun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1689 - 1692
  • [50] Anomaly detection scheme using data mining in mobile environment
    Park, K
    Ryou, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 21 - 30