An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network

被引:0
|
作者
Wanwei Huang
Jianwei Zhang
Haiyan Sun
Huan Ma
Zengyu Cai
机构
[1] Zhengzhou University of Light Industry,Software Engineering College
[2] Zhengzhou University of Light Industry,School of Computer and Communication Engineering
来源
关键词
Anomaly detection; Normalized mutual information feature selection; Quantum wavelet neural network; Structural risk minimization; Extreme learning machine;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents an anomaly detection model based on normalized mutual information feature selection (NMIFS) and quantum wavelet neural network (QWNN). The goal of the proposed model is to address the problem of determining the feature subset used to detect an anomaly in a machine learning task. In order to achieve an effective reduction for high-dimensional feature data, the NMIFS method is used to select the best feature combination from a given set of sample features. Then, the best combination of feature vectors are sent to the QWNN classifier for learning and training in the training phase, and the anomaly detection model is obtained. At the detection stage, the data is fed into the detection model and ultimately generates accurate detection results. The learning algorithm of structural risk minimization extreme learning machine is employed by the QWNN classifier to account for empirical and confidence risk. The experimental results on real abnormal data demonstrate that the NMIFS–QWNN method has higher detection accuracy and a lower false negative rate than the existing common anomaly detection methods. Furthermore, the complexity of the algorithm is low and the detection accuracy can reach up to 95.8%.
引用
收藏
页码:2693 / 2713
页数:20
相关论文
共 50 条
  • [41] A novel feature gene selection method based on neighborhood mutual information
    Chen, Tao
    Hong, Zenglin
    Zhao, Hui
    Yang, Xiao
    Wei, Jun
    International Journal of Hybrid Information Technology, 2015, 8 (07): : 277 - 292
  • [42] A Fuzzy Mutual Information-based Feature Selection Method for Classification
    Hogue, N.
    Ahmed, H. A.
    Bhattacharyya, D. K.
    Kalita, J. K.
    FUZZY INFORMATION AND ENGINEERING, 2016, 8 (03) : 355 - 384
  • [43] Optimized automatic sleep stage classification using the normalized mutual information feature selection (NMIFS) method
    Cho, Dongrae
    Lee, Boreom
    2017 39TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2017, : 3094 - 3097
  • [44] Conditional Mutual Information based Feature Selection
    Cheng, Hongrong
    Qin, Zhiguang
    Qian, Weizhong
    Liu, Wei
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 103 - 107
  • [45] A wrapper for feature selection based on mutual information
    Huang, Jinjie
    Cai, Yunze
    Xu, Xiaoming
    18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 2, PROCEEDINGS, 2006, : 618 - +
  • [46] Feature Selection and Discretization based on Mutual Information
    Sharmin, Sadia
    Ali, Amin Ahsan
    Khan, Muhammad Asif Hossain
    Shoyaib, Mohammad
    2017 IEEE INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2017,
  • [47] PCA based on mutual information for feature selection
    Fan, X.-L. (fanxueli@mail.ioa.ac.cn), 1600, Northeast University (28):
  • [48] Intrusion Detection Method Based on Wavelet Neural Network
    Sun, Jianjing
    Yang, Han
    Tian, Jingwen
    Wu, Fan
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 851 - +
  • [49] BGP Anomaly Detection Based on Automatic Feature Extraction by Neural Network
    Xu, Mengying
    Li, Xing
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 46 - 50
  • [50] CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques
    Gottwalt, Florian
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTERS & SECURITY, 2019, 83 : 234 - 245