Skip to main content
Top
Published in: Cluster Computing 3/2019

19-01-2018

Cluster computing data mining based on massive intrusion interference constraints in hybrid networks

Authors: Kun Zhang, Chong Shen, Haifeng Wang, Zhuang Li, Qian Gao, Xiaoyan Chen

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To solve the problem that massive intrusion data in hybrid networks greatly interfere network intrusion detection and cause relatively great difficulty to detection due to their frequency discontinuity, a mining algorithm of massive intrusion cluster computing data in hybrid networks based on spectral feature extraction under fixed constraints of time–frequency window is proposed in this paper. The multi-component cross-detection method is used to collect massive intrusion information in hybrid networks and construct a model of massive intrusion signal in hybrid networks. Cascading notch method is used to suppress intrusion interference under constraints of fixed time–frequency window, and extract fundamental quantity and primary function with locality in massive interference information, and obtain a complete energy distribution spectrum on the time–frequency plane. The energy distribution spectrum is used as guidance function to realize cluster calculating data mining with massive intrusion interference constraints. Simulation results show that, in the intrusion detection process of signal-to-noise ratio from − 15 to − 5 dB, the detection accuracy of the method proposed in this paper is always better than that of others. When the signal-to-noise ratio is − 9 dB, the detection accuracy of this method is over 90%. When the signal-to-noise ratio is −9 dB, the detection accuracy of this method can reach 100%. About the detection time, especially after the Number of intrusion date is 2000, the detection time difference between the three methods is increased, and the detection time of other methods is 2–3 times of paper method. The method proposed can accurately locate mass intrusion distribution sources in hybrid networks under the large frequency oscillation of intrusion data in the hybrid networks, realize network intrusion detection and interference suppression and can filter interference information well, so this method improves intrusion detection probability in hybrid networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hsieh, J.W., Lam, K.Y., Huang, P.C., et al.: Block-based multi-version B+-Tree for flash-based embedded database systems [J]. IEEE Trans. Comput. 64(4), 925–940 (2015)MathSciNetCrossRef Hsieh, J.W., Lam, K.Y., Huang, P.C., et al.: Block-based multi-version B+-Tree for flash-based embedded database systems [J]. IEEE Trans. Comput. 64(4), 925–940 (2015)MathSciNetCrossRef
2.
go back to reference Dai, L., Gao, X., Wang, Z.: Energy-efficient hybrid precoding based on successive interference cancelation for millimeter-wave massive MIMO systems [C]. In: Radio and Antenna Days of the Indian Ocean, pp. 1–2. IEEE (2015) Dai, L., Gao, X., Wang, Z.: Energy-efficient hybrid precoding based on successive interference cancelation for millimeter-wave massive MIMO systems [C]. In: Radio and Antenna Days of the Indian Ocean, pp. 1–2. IEEE (2015)
3.
go back to reference Zhang, W.M., Chen, Q.Z.: Network intrusion detection algorithm based on HHT with shift hierarchical control [J]. Comput. Sci. 41(12), 107–111 (2014)MathSciNet Zhang, W.M., Chen, Q.Z.: Network intrusion detection algorithm based on HHT with shift hierarchical control [J]. Comput. Sci. 41(12), 107–111 (2014)MathSciNet
4.
go back to reference Jia, W., Xiao, L., Zhu, D.: A mini-ripple control method for doubly salient electromagnetic motor control system [C]. In: Applied Power Electronics Conference and Exposition, pp. 1886–1890. IEEE (2017) Jia, W., Xiao, L., Zhu, D.: A mini-ripple control method for doubly salient electromagnetic motor control system [C]. In: Applied Power Electronics Conference and Exposition, pp. 1886–1890. IEEE (2017)
5.
go back to reference Chen, Y.C., Lin, Z.H., Zhao, X., et al.: Deep learning-based classification of hyperspectral data [J]. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 7(6), 2094–2107 (2014)CrossRef Chen, Y.C., Lin, Z.H., Zhao, X., et al.: Deep learning-based classification of hyperspectral data [J]. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 7(6), 2094–2107 (2014)CrossRef
6.
go back to reference Wan, L.J., Tang, K., Li, M.Z., et al.: Collaborative active and semisupervised learning for hyperspectral remote sensing image classification [J]. IEEE Trans. Geosci. Remote Sens. 53(5), 2384–2396 (2015)CrossRef Wan, L.J., Tang, K., Li, M.Z., et al.: Collaborative active and semisupervised learning for hyperspectral remote sensing image classification [J]. IEEE Trans. Geosci. Remote Sens. 53(5), 2384–2396 (2015)CrossRef
7.
go back to reference Hao, H.: Multi component LFM signal detection and parameter estimation based on EEMD-FRFT [J]. Opt. Int. J. Light Electron Opt. 124(23), 6093–6096 (2013)CrossRef Hao, H.: Multi component LFM signal detection and parameter estimation based on EEMD-FRFT [J]. Opt. Int. J. Light Electron Opt. 124(23), 6093–6096 (2013)CrossRef
8.
go back to reference Meng, B., Zhang, J.L., Lu, J.T.: Automatic analysis of authentication of OpenID connect protocol based on the computational model [J]. J. South Central Univ. Natl. 35(3), 123–129 (2016) Meng, B., Zhang, J.L., Lu, J.T.: Automatic analysis of authentication of OpenID connect protocol based on the computational model [J]. J. South Central Univ. Natl. 35(3), 123–129 (2016)
9.
go back to reference Wang, H.X., Wang, S.Y., Wang, X., et al.: Analysis of LFM signals and improvement of IFM system [J]. Acta Armamentarii 35(8), 1193–1199 (2014) Wang, H.X., Wang, S.Y., Wang, X., et al.: Analysis of LFM signals and improvement of IFM system [J]. Acta Armamentarii 35(8), 1193–1199 (2014)
10.
go back to reference Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks [J]. Lect. Notes Eng. Comput. Sci. 2174(1), 477–480 (2009) Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks [J]. Lect. Notes Eng. Comput. Sci. 2174(1), 477–480 (2009)
11.
go back to reference Thulasiraman, P., Shen, X.: Interference aware resource allocation for hybrid hierarchical wireless networks [J]. Comput. Netw. 54(13), 2271–2280 (2010)CrossRef Thulasiraman, P., Shen, X.: Interference aware resource allocation for hybrid hierarchical wireless networks [J]. Comput. Netw. 54(13), 2271–2280 (2010)CrossRef
12.
go back to reference Tran, H., Zepernick, H.J., Phan, H., et al.: Cognitive cooperative networks with cluster-based relaying under interference constraints[C]. In: International Conference on Ubiquitous & Future Networks, pp. 542–546. IEEE (2013) Tran, H., Zepernick, H.J., Phan, H., et al.: Cognitive cooperative networks with cluster-based relaying under interference constraints[C]. In: International Conference on Ubiquitous & Future Networks, pp. 542–546. IEEE (2013)
13.
go back to reference Xie, M.G., Jia, X.D., Zhou, M.: Research on energy efficiency of hybrid networks based on massive MIMO and D2D [J]. J. Signal Process. 16(24), 53–58 (2017) Xie, M.G., Jia, X.D., Zhou, M.: Research on energy efficiency of hybrid networks based on massive MIMO and D2D [J]. J. Signal Process. 16(24), 53–58 (2017)
14.
go back to reference Feng, W., Feng, S., Ding, Y., et al.: Scalable cross-layer multipath routing under interference constraints in wireless mesh networks [J]. Int. J. Ad Hoc Ubiquitous Comput. 21(3), 194–206 (2016)CrossRef Feng, W., Feng, S., Ding, Y., et al.: Scalable cross-layer multipath routing under interference constraints in wireless mesh networks [J]. Int. J. Ad Hoc Ubiquitous Comput. 21(3), 194–206 (2016)CrossRef
15.
go back to reference Liu, Y., Li, Y., Man, H., et al.: A hybrid data mining anomaly detection technique in ad hoc networks [J]. Int. J. Wirel. Mobile Comput. 2(1), 37–46 (2007)CrossRef Liu, Y., Li, Y., Man, H., et al.: A hybrid data mining anomaly detection technique in ad hoc networks [J]. Int. J. Wirel. Mobile Comput. 2(1), 37–46 (2007)CrossRef
16.
go back to reference Yousef, E.L., Toumanari, A., Bouirden, A., et al.: Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection [J]. Int. J. Adv. Comput. Sci. Appl. 6(9), 13–17 (2015) Yousef, E.L., Toumanari, A., Bouirden, A., et al.: Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection [J]. Int. J. Adv. Comput. Sci. Appl. 6(9), 13–17 (2015)
17.
go back to reference Ding, Y., Pongaliur, K., Xiao, L.: Channel allocation and routing in hybrid multichannel multiradio wireless mesh networks [J]. IEEE Trans. Mobile Comput. 12(2), 206–218 (2013)CrossRef Ding, Y., Pongaliur, K., Xiao, L.: Channel allocation and routing in hybrid multichannel multiradio wireless mesh networks [J]. IEEE Trans. Mobile Comput. 12(2), 206–218 (2013)CrossRef
18.
go back to reference Shen, H., Li, Z., Yu, L.: A P2P-based market-guided distributed routing mechanism for high-throughput hybrid wireless networks [J]. IEEE Trans. Mobile Comput. 14(2), 245–260 (2015)CrossRef Shen, H., Li, Z., Yu, L.: A P2P-based market-guided distributed routing mechanism for high-throughput hybrid wireless networks [J]. IEEE Trans. Mobile Comput. 14(2), 245–260 (2015)CrossRef
19.
go back to reference Kurras, M., Thiele, L., Caire, G.: Multi-stage beamforming for interference coordination in massive MIMO networks[C]. In: Asilomar Conference on Signals, Systems and Computers, pp. 700–703. IEEE (2015) Kurras, M., Thiele, L., Caire, G.: Multi-stage beamforming for interference coordination in massive MIMO networks[C]. In: Asilomar Conference on Signals, Systems and Computers, pp. 700–703. IEEE (2015)
20.
go back to reference An, K., Lin, M., Zhu, W.P., et al.: Outage performance of cognitive hybrid satellite-terrestrial networks with interference constraint [J]. IEEE Trans. Veh. Technol. 65(11), 9397–9404 (2016)CrossRef An, K., Lin, M., Zhu, W.P., et al.: Outage performance of cognitive hybrid satellite-terrestrial networks with interference constraint [J]. IEEE Trans. Veh. Technol. 65(11), 9397–9404 (2016)CrossRef
21.
go back to reference Wu, H.H., Mu, Y., Qu, Z.F., et al.: Similarity and nearness relational degree based on panel data [J]. Control Decis. 31(03), 555–558 (2016)MATH Wu, H.H., Mu, Y., Qu, Z.F., et al.: Similarity and nearness relational degree based on panel data [J]. Control Decis. 31(03), 555–558 (2016)MATH
Metadata
Title
Cluster computing data mining based on massive intrusion interference constraints in hybrid networks
Authors
Kun Zhang
Chong Shen
Haifeng Wang
Zhuang Li
Qian Gao
Xiaoyan Chen
Publication date
19-01-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1780-4

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner