Skip to main content
Top

2015 | OriginalPaper | Chapter

An Efficient Unsavory Data Detection Method for Internet Big Data

Authors : Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu

Published in: Information and Communication Technology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the explosion of information technologies, the volume and diversity of the data in the cyberspace are growing rapidly; meanwhile the unsavory data are harming the security of Internet. So how to detect the unsavory data from the Internet big data based on their inner semantic information is of growing importance. In this paper, we propose the i-Tree method, an intelligent semantics-based unsavory data detection method for internet big data. Firstly, the internet big data are mapped into a high-dimensional feature space, representing as high-dimensional points in the feature space. Secondly, to solve the “curse of dimensionality” problem of the high-dimensional feature space, the principal component analysis (PCA) method is used to reduce the dimensionality of the feature space. Thirdly, in the new generated feature space, we cluster the data objects, transform the data clusters into regular unit hyper-cubes and create one-dimensional index for data objects based on the idea of multi-dimensional index. Finally, we realize the semantics-based data detection for a given unsavory data object according to similarity search algorithm and the experimental results proved our method can achieve much better efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fedorchenko, A., Kotenko, I., Chechulin, A.: Integrated repository of security information for network security evaluation. JoWUA 6(2), 41–57 (2015) Fedorchenko, A., Kotenko, I., Chechulin, A.: Integrated repository of security information for network security evaluation. JoWUA 6(2), 41–57 (2015)
2.
go back to reference Shahzad, R.K., Lavesson, N.: Comparative analysis of voting schemes for ensemble-based malware detection. JoWUA 4(1), 98–117 (2013) Shahzad, R.K., Lavesson, N.: Comparative analysis of voting schemes for ensemble-based malware detection. JoWUA 4(1), 98–117 (2013)
3.
go back to reference Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. JoWUA 6(2), 78–97 (2015) Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. JoWUA 6(2), 78–97 (2015)
4.
go back to reference Zhan, Y., Yin, J., Liu, X.: A convergent solution to matrix bidirectional projection based feature extraction with application to face recognition. Int. J. Comput. Intell. Syst. 4(5), 863–873 (2011)CrossRef Zhan, Y., Yin, J., Liu, X.: A convergent solution to matrix bidirectional projection based feature extraction with application to face recognition. Int. J. Comput. Intell. Syst. 4(5), 863–873 (2011)CrossRef
5.
go back to reference Bohm, C.: Searching in high-dimensional spaces: index structures for improving the performance of multimedia databases. ACM Comput. Surv. 33, 322–373 (2001)CrossRef Bohm, C.: Searching in high-dimensional spaces: index structures for improving the performance of multimedia databases. ACM Comput. Surv. 33, 322–373 (2001)CrossRef
6.
go back to reference Zhang, R., Ooi, B.C., Tan, K.L.: Making the pyramid technique robust to query types and workloads. In: Data Engineering 2004, p. 313 (2006) Zhang, R., Ooi, B.C., Tan, K.L.: Making the pyramid technique robust to query types and workloads. In: Data Engineering 2004, p. 313 (2006)
7.
go back to reference Jagadish, H.V., Ooi, B.C.: iDistance techniques. In: Encyclopedia of GIS, pp. 469–471. Springer, New York (2008) Jagadish, H.V., Ooi, B.C.: iDistance techniques. In: Encyclopedia of GIS, pp. 469–471. Springer, New York (2008)
8.
go back to reference Zhan, Y., Yin, J.: Robust local tangent space alignment via iterative weighted PCA. Neurocomputing 74(11), 1985–1993 (2011)CrossRef Zhan, Y., Yin, J.: Robust local tangent space alignment via iterative weighted PCA. Neurocomputing 74(11), 1985–1993 (2011)CrossRef
Metadata
Title
An Efficient Unsavory Data Detection Method for Internet Big Data
Authors
Peige Ren
Xiaofeng Wang
Hao Sun
Fen Xu
Baokang Zhao
Chunqing Wu
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-24315-3_21

Premium Partner