A Cloud Security Situational Awareness Model Based on Parallel Apriori Algorithm

Article Preview

Abstract:

Network Security Situation Awareness (NSSA) is a hot topic in network security field, and cloud computing is a new technology integrated virtual storage and distributed computing. It has become the challenging questions how to provide efficient and reliable service for NSSA based on the cloud computing.This paper proposes a cloud security situation awareness model based on data mining, and puts forwarda parallelfrequent-tree Apriori algorithm (PFT-Apriori) for mining association rules. Compare with the traditional Apriori algorithm, the experimental results show that the performance of system is increased by 51% under PFT-algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6294-6297

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y. Li, Research on Network Security Situation Awareness Based on Association Rule, Proc. IEEE Symp. Internet Technology and Applications, Wuhan, Aug. 2010, p.1 – 4, doi: 10. 1109/ITAPP. 2010. 5566194.

Google Scholar

[2] T. Hu, H. Chen, L. Huang, and X. Zhu, A Survey of Mass Data Mining Based on Cloud computing, Proc. IEEE Symp. Anti-Counterfeiting, Security and Identification (ASlD), Taipei, august 2012, pp.1-4, doi: 10. 1109/ICASID. 2012. 6325353.

DOI: 10.1109/icasid.2012.6325353

Google Scholar

[3] W. Chen, Mining weighted association rules based on weighted Fp tree, Proc. IEEE Symp. E -Business and E -Government (ICEE), Shanghai, May 2011, pp.1-4, doi: 10. 1109/ ICEBEG. 2011. 5884502.

DOI: 10.1109/icebeg.2011.5884502

Google Scholar

[4] B. He, Fast Mining Algorithm of Global Maximum Frequent Itemsets, Springer Berlin Heidelberg: Advances in Intelligent and Soft Computing(AISC), Heidelberg, 2012, pp.199-204, doi: 10. 1007/978-3-642-27951-5_30.

DOI: 10.1007/978-3-642-27951-5_30

Google Scholar

[5] Y. Ye, and C. Chiang, AParallel Apriori Algorithm for Frequent Itemsets Mining, Proc. IEEE Symp. Software Engineering Research, Management and Applications, Seattle, Aug. 2006, pp.87-94, doi: 10. 1109/SERA. 2006. 6.

DOI: 10.1109/sera.2006.6

Google Scholar

[6] H.G. Li, and Y. Ni, IntrusionDetection TechnologyResearch Based on Apriori Algorithm, Elsevier: Applied Physics and Industrial Engineering, Beijing, Vol. 24, Part. C, 2012, pp.1615-1620, doi: 10. 1016/j. phpro. 2012. 02. 238.

Google Scholar

[7] N. Padhy, P. Mishra, and R. Panigrahi, The Survey of Data Mining Applications And Feature Scope, IJCSEIT, Vol. 2, No. 3, June 2012, pp.48-53, doi: 10. 5121/ijcseit. 2012. 2303.

DOI: 10.5121/ijcseit.2012.2303

Google Scholar

[8] J. Singh, H. Ram, and J.S. Sodh, Improving Efficiency of Apriori Algorithm Using Transaction Reduction, International Journal of Scientific and Research Publications, Vol. 3, Issue. 1, January 2013, pp.1-4.

Google Scholar

[9] Y.B. Jia, G.H. Xia, An Improved Apriori Algorithm Based on Association Analysis, Proc. IEEE Symp. Networking and Distributed Computing (ICNDC), Hangzhou, Oct. 2012, pp.208-211, doi: 10. 1109/ICNDC. 2012. 56.

DOI: 10.1109/icndc.2012.8

Google Scholar