期刊文献+

基于子项集时间序列的模式挖掘及其在Web安全上的应用 被引量:1

Model Mining on Time Series of Sub-item Set and Related Application on Web Security
下载PDF
导出
摘要 针对子项集时间序列提出一种模式挖掘的数学模型.此模型计算并更新子项的平均频率,并以模式考察时间阈值为周期,计算当前实时频率矢量和模式集中现有实时频率矢量的皮尔松相关性.如果相关系数大,则说明当前模式已经存在于模式集中;如果相关系数小,则说明当前模式是一个新模式,继而加入模式集.此过程持续运行,直至当模式集趋于稳定.另外,本文考察了模式之间的顺序关系,即模式之间的模式.通过设置一个窗口寄存器,并在模式序列矩阵中的对应位置计数加1,模型可以计算出任两个模式之间顺序的支持度和信任度.此模型关注的是提取出子项集的模式、子项集模式之间的模式.此外,通过调节考察时间的阈值,此模型也能提取出子项集模式之中的模式.在实验中,通过模拟子项集序列,我们证明了理论模型的有效性和普适性.结合实践,运用此模型到Web安全上,通过对新浪门户网站的考察和检验,此模型对于防御Web异常问题非常高效. This paper proposes an analytical algorithm on mining models in time series. The algorithm calculates and updates the aver- age frequency for each sub - set item. In each checking period, we compute the Pearson correlation coefficient between the real - time frequency vector and the ones in mode set. If the coefficient is larger than threshold, current vector is deemed to be enumerated in the model set. If the coefficient is smaller than threshold, we add this vector into the model set and consider it as a new model. This process continues till the model set becomes steady. The proposed algorithm also examines the sequence between models. Through a temporary memory recording new models, the value of support and confidence for each model can be derived. In this paper, we con- centrate on the models, the models between models and the models inside models. In experiments, by simulating a sequence of sub - set items, we prove the effectiveness and the correctness of the proposed mechanism. In practice, we introduced the data from www. sina. com and found that this algorithm is very effective for the Web security.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第9期1903-1907,共5页 Journal of Chinese Computer Systems
基金 国家"九七三"计划前期研究专项课题项目(2008CB317111)资助 国家自然科学基金项目(60873079)资助
关键词 子项集 时间序列 模式挖掘 WEB安全 sub-item time series model mining Web security
  • 相关文献

参考文献9

  • 1Xie Yi, Yu Shun-zheng. A large-sclae hidden semi-Markov model for anomaly detection on user browsing behaviours[ J]. IEEE/ACM Transactions on Networking.2009.17 (1) :54-65.
  • 2Xie Yi,Yu Shun-zheng. Monitoring the application-layer DDoS attacks for popular websites [J]. IEEE/ACM Transactions on Networking ,2009,17 ( 1 ) : 15-25.
  • 3Georgios Oikonomou ,Jelena Mirkovic. Modelling human behaviour for defense against flash-crowd attacks [ C ]. IEEE International Conference on Communications, Dresden, Germany,2009 : 1-6.
  • 4Krishnamurthy B, Wang J. On network-aware clustering of web clients [ C ]. In Proceedings of the ACM SIGCOMM, Stockholm, Sweden, 2000:97-110.
  • 5Mannila H, Toivonen H, Verkamo A. Discovering frequent episodes in sequences[C]. In:Proc. 1st KDD,1995:210-215.
  • 6Gwadera R, Atallah M, Szpankowski W. Detection of significant sets of episodes in event sequences [ C ]. Proc. of the 4th ICDM, Brighton, USA, 2004 : 3-10.
  • 7Luo J, Susan M B, Rayfod BV. Mining fuzzy association rules and fuzzy frequency episodes for instruction detection [ J ]. International Journal of Intelligent System,2000,15 ( 8 ) :687-703.
  • 8Su Ming-Yang, Yub Gwo-Jong, Lina Chun-Yuen. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach [ J ]. Computers and Security,2009,28 (5) :301-309.
  • 9Su Ming-yang. Discovery and prevention of attack episodes by frequent episodes mining and finite state machines[ J]. Journal of Network and Computer Applications,2010,33(2) :156-167.

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部